Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-34169 (GCVE-0-2022-34169)
Vulnerability from cvelistv5
- integer truncation
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Xalan-J |
Version: Xalan-J < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:16:17.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "name": "[oss-security] 20220719 CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "name": "[oss-security] 20220720 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "name": "DSA-5188", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "name": "DSA-5192", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-19b6f21746", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "name": "FEDORA-2022-ae563934f7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "name": "FEDORA-2022-e573851f56", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "name": "FEDORA-2022-d26586b419", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "name": "FEDORA-2022-80afe2304a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "name": "FEDORA-2022-b76ab52e73", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "name": "[oss-security] 20221017 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "name": "[debian-lts-announce] 20221018 [SECURITY] [DLA 3155-1] bcel security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "name": "DSA-5256", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "name": "[oss-security] 20221104 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "name": "[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-25" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Xalan-J", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.7.2", "status": "affected", "version": "Xalan-J", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Reported by Felix Wilhelm, Google Project Zero" } ], "descriptions": [ { "lang": "en", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." } ], "problemTypes": [ { "descriptions": [ { "description": "integer truncation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:07:47.103Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "name": "[oss-security] 20220719 CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "name": "[oss-security] 20220720 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "name": "DSA-5188", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "name": "DSA-5192", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-19b6f21746", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "name": "FEDORA-2022-ae563934f7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "name": "FEDORA-2022-e573851f56", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "name": "FEDORA-2022-d26586b419", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "name": "FEDORA-2022-80afe2304a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "name": "FEDORA-2022-b76ab52e73", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "name": "[oss-security] 20221017 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "name": "[debian-lts-announce] 20221018 [SECURITY] [DLA 3155-1] bcel security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "name": "DSA-5256", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "name": "[oss-security] 20221104 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "name": "[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "url": "https://security.gentoo.org/glsa/202401-25" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-34169", "datePublished": "2022-07-19T00:00:00.000Z", "dateReserved": "2022-06-21T00:00:00.000Z", "dateUpdated": "2025-02-13T16:32:44.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-34169\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-07-19T18:15:11.740\",\"lastModified\":\"2024-11-21T07:08:59.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.\"},{\"lang\":\"es\",\"value\":\"La biblioteca Apache Xalan Java XSLT es vulnerable a un problema de truncamiento de enteros cuando procesa hojas de estilo XSLT maliciosas. Esto puede usarse para corromper los archivos de clase Java generados por el compilador interno XSLTC y ejecutar c\u00f3digo de bytes Java arbitrario. El proyecto Apache Xalan Java est\u00e1 inactivo y en proceso de ser retirado. No son esperadas futuras versiones de Apache Xalan Java que abordan este problema. Nota: Los tiempos de ejecuci\u00f3n de Java (como OpenJDK) incluyen copias reempaquetadas de Xalan.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-681\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.2\",\"matchCriteriaId\":\"E406791B-F9FD-4E3F-831C-296D8F8FF9BE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"7D961E24-EA18-4217-B5F5-F847726D84E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"601D92C4-F71F-47E2-9041-5C286D2137F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B18FE85D-C53D-44E9-8992-715820D1264B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E3C0BA3-FCD3-4CB8-B8C7-F931090A7DBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB2A5440-7FA7-4A86-AA19-E2ABBD809B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C0485FC-E4B2-464E-8228-1387AC5F353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF3539B-0434-4310-AE88-F46864C7C20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:18.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5CC9398-71B6-4480-95ED-EDCE838D157E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update343:*:*:*:*:*:*\",\"matchCriteriaId\":\"60614E43-090E-44D7-94AD-FFAE38FF111F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update333:*:*:*:*:*:*\",\"matchCriteriaId\":\"131E1C9E-721C-4176-B78B-69C01F90A9A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:11.0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD4BFA12-588A-4D8D-B45F-648A55EC674C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:18.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF9CFB1-CEC9-483E-BECF-618190C03944\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11\",\"versionEndIncluding\":\"11.0.15\",\"matchCriteriaId\":\"DD2ADA66-DCD0-4D28-80B2-77A0265CE7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13\",\"versionEndIncluding\":\"13.0.11\",\"matchCriteriaId\":\"8CA6BC07-2BDA-4913-AF2B-FD2146B0E539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15\",\"versionEndIncluding\":\"15.0.7\",\"matchCriteriaId\":\"5A2E366B-549D-48C5-B3FB-AD0E8C75AE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17\",\"versionEndIncluding\":\"17.0.3\",\"matchCriteriaId\":\"15FD6A0B-BB1A-4875-926C-AB1B6EC1A053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"02011EDC-20A7-4A16-A592-7C76E0037997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6D4652-1226-4C60-BEDF-01EBF8AC0849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1F9ED7-7D93-41F4-9130-15BA734420AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF9CDF1-95D3-4125-A73F-396D2280FC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"A13266DC-F8D9-4F30-987F-65BBEAF8D3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28388AB-CFC9-4749-A90F-383F5B905EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1B00F9-A81C-48B7-8DAA-F394DDF323F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7AD457-6CE6-4925-8D94-A907B40233D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"5480E5AD-DB46-474A-9B57-84ED088A75FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"881A4AE9-6012-4E91-98BE-0A352CC20703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E1079-57D9-473B-A017-964F4745F329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D6446E-2915-4F12-87BE-E7420BC2626E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"564EDCE3-16E6-401D-8A43-032D1F8875E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"08278802-D31B-488A-BA6A-EBC816DF883A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBB0969-565E-43E2-B067-A10AAA5F1958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78BE95D-6270-469A-8035-FCDDB398F952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C24F40-3150-4584-93D9-8307DE04EEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"19626B36-62FC-4497-A2E1-7D6CD9839B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"5713AEBD-35F6-44E8-A0CC-A42830D7AE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE0C04B-440E-4B35-ACC8-6264514F764C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"555EC2A6-0475-48ED-AE0C-B306714A9333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C55E2E-AEDE-455C-B128-168C918B5D97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"81831D37-6597-441B-87DE-38F7191BEA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA1594D-0AB5-436D-9E60-C26EE2175753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"B868FA41-C71B-491C-880B-484740B30C72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C242D3BE-9114-4A9E-BB78-45754C7CC450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*\",\"matchCriteriaId\":\"95954182-9541-4181-9647-B17FA5A79F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6F0137-F91F-4028-BED2-C29640D52C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFB6B15-4AE6-47FC-8847-9DFADB7AE253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61068FE-18EE-4ADB-BC69-A3ECE8724575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB59E80-4EC4-4399-BF40-6733E4E475A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E31265-22E1-4E91-BFCB-D2AFF445926A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"50319E52-8739-47C5-B61E-3CA9B6A9A48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED515B9-DC74-4DC5-B98A-08D87D85E11E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D1D4868-1F9F-43F7-968C-6469B67D3F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"568F1AC4-B0D7-4438-82E5-0E61500F2240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E9133E-9FF3-40DB-9A11-7469EF5FD265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"94834710-3FA9-49D9-8600-B514CBCA4270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"4228D9E1-7D82-4B49-9669-9CDAD7187432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6231F48-2936-4F7D-96D5-4BA11F78EBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96D5061-4A81-497E-9AD6-A8381B3B454C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*\",\"matchCriteriaId\":\"5345C21E-A01B-43B9-9A20-F2783D921C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B219F360-83BD-4111-AB59-C9D4F55AF4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25377EA-8E8F-4C76-8EA9-3BBDFB352815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FEFE05-269A-4EAF-A80F-E4C2107B1197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E2AA7C-F602-4DB7-9EC1-0708C46C253C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB70E154-A304-429E-80F5-8D87B00E32D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"70892D06-6E75-4425-BBF0-4B684EC62A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"67ED8559-C348-4932-B7CE-CB96976A30EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40AC3D91-263F-4345-9FAA-0E573EA64590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4B2F24-A730-4818-90C8-A2D90C081F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"464087F2-C285-4574-957E-CE0663F07DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\",\"matchCriteriaId\":\"083419F8-FDDF-4E36-88F8-857DB317C1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\",\"matchCriteriaId\":\"07812576-3C35-404C-A7D7-9BE9E3D76E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C52B1C-5447-4282-9667-9EBE0720B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\",\"matchCriteriaId\":\"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE30779-48FB-451E-8CE1-F469F93B8772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\",\"matchCriteriaId\":\"60590FDE-7156-4314-A012-AA38BD2ADDC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24F6122-2256-41B6-9033-794C6424ED99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D6F19F-59B5-4BB6-AD35-013384025970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\",\"matchCriteriaId\":\"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB74086-14B8-4237-8357-E0C6B5BB8313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\",\"matchCriteriaId\":\"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3F367-33AD-47C3-BFDC-871A17E72C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"78261932-7373-4F16-91E0-1A72ADBEBC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A40B8A-D428-4008-9F21-AF21394C51D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B504718-5DCE-43B4-B19A-C6B6E7444BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"3102AA10-99A8-49A9-867E-7EEC56865680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BA8A26-2CDA-442B-A549-6BE92DCCD205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F2883B-6A1B-4081-8877-07AF3A73F6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C0742E-ACDD-4DB4-8A4C-B96702C8976C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8483034-DD5A-445D-892F-CDE90A7D58EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*\",\"matchCriteriaId\":\"1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"8279718F-878F-4868-8859-1728D13CD0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C024E1A-FD2C-42E8-B227-C2AFD3040436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F24389D-DDD0-4204-AA24-31C920A4F47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"966979BE-1F21-4729-B6B8-610F74648344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8534265-33BF-460D-BF74-5F55FDE50F29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F77AFC25-1466-4E56-9D5F-6988F3288E16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*\",\"matchCriteriaId\":\"A650BEB8-E56F-4E42-9361-8D2DB083F0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*\",\"matchCriteriaId\":\"799FFECD-E80A-44B3-953D-CDB5E195F3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7047507-7CAF-4A14-AA9A-5CEF806EDE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC7B179-95D3-4F94-84F6-73F1034A1AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB28526-9385-44CA-AF08-1899E6C3AE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26B69E4-0B43-415F-A82B-52FDCB262B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BC4150-70EC-462B-8FC5-20B3442CBB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*\",\"matchCriteriaId\":\"02646989-ECD9-40AE-A83E-EFF4080C69B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CBFC1F-C120-44F2-877A-C1C880AA89C4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF6650C-558D-45C8-AE7D-136EE70CB6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAA4004-9319-478C-9D55-0E8307F872F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E4633C4-E552-439D-8FE4-139E3A7956CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C77346-8893-44F0-B0D1-5D4D30A9CA3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63E58DE0-A96A-452E-986F-3BD2FEA7C723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD7A33EC-DE03-424F-9796-E5EA071FF6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6302149-28AA-481E-BC6C-87D05E73768A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DFD9D8-8648-40F7-81B8-04F852A337FA\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/5\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/6\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/2\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/3\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/10/18/2\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/04/8\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/07/2\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/202401-25\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220729-0009/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5188\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5192\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5256\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/10/18/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/04/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/07/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202401-25\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220729-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5192\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:13189-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xalan-j2-2.7.3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xalan-j2-2.7.3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13189", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13189-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "xalan-j2-2.7.3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13189-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xalan-j2-2.7.3-1.1.aarch64", "product": { "name": "xalan-j2-2.7.3-1.1.aarch64", "product_id": "xalan-j2-2.7.3-1.1.aarch64" } }, { "category": "product_version", "name": "xalan-j2-demo-2.7.3-1.1.aarch64", "product": { "name": "xalan-j2-demo-2.7.3-1.1.aarch64", "product_id": "xalan-j2-demo-2.7.3-1.1.aarch64" } }, { "category": "product_version", "name": "xalan-j2-manual-2.7.3-1.1.aarch64", "product": { "name": "xalan-j2-manual-2.7.3-1.1.aarch64", "product_id": "xalan-j2-manual-2.7.3-1.1.aarch64" } }, { "category": "product_version", "name": "xalan-j2-xsltc-2.7.3-1.1.aarch64", "product": { "name": "xalan-j2-xsltc-2.7.3-1.1.aarch64", "product_id": "xalan-j2-xsltc-2.7.3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xalan-j2-2.7.3-1.1.ppc64le", "product": { "name": "xalan-j2-2.7.3-1.1.ppc64le", "product_id": "xalan-j2-2.7.3-1.1.ppc64le" } }, { "category": "product_version", "name": "xalan-j2-demo-2.7.3-1.1.ppc64le", "product": { "name": "xalan-j2-demo-2.7.3-1.1.ppc64le", "product_id": "xalan-j2-demo-2.7.3-1.1.ppc64le" } }, { "category": "product_version", "name": "xalan-j2-manual-2.7.3-1.1.ppc64le", "product": { "name": "xalan-j2-manual-2.7.3-1.1.ppc64le", "product_id": "xalan-j2-manual-2.7.3-1.1.ppc64le" } }, { "category": "product_version", "name": "xalan-j2-xsltc-2.7.3-1.1.ppc64le", "product": { "name": "xalan-j2-xsltc-2.7.3-1.1.ppc64le", "product_id": "xalan-j2-xsltc-2.7.3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xalan-j2-2.7.3-1.1.s390x", "product": { "name": "xalan-j2-2.7.3-1.1.s390x", "product_id": "xalan-j2-2.7.3-1.1.s390x" } }, { "category": "product_version", "name": "xalan-j2-demo-2.7.3-1.1.s390x", "product": { "name": "xalan-j2-demo-2.7.3-1.1.s390x", "product_id": "xalan-j2-demo-2.7.3-1.1.s390x" } }, { "category": "product_version", "name": "xalan-j2-manual-2.7.3-1.1.s390x", "product": { "name": "xalan-j2-manual-2.7.3-1.1.s390x", "product_id": "xalan-j2-manual-2.7.3-1.1.s390x" } }, { "category": "product_version", "name": "xalan-j2-xsltc-2.7.3-1.1.s390x", "product": { "name": "xalan-j2-xsltc-2.7.3-1.1.s390x", "product_id": "xalan-j2-xsltc-2.7.3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xalan-j2-2.7.3-1.1.x86_64", "product": { "name": "xalan-j2-2.7.3-1.1.x86_64", "product_id": "xalan-j2-2.7.3-1.1.x86_64" } }, { "category": "product_version", "name": "xalan-j2-demo-2.7.3-1.1.x86_64", "product": { "name": "xalan-j2-demo-2.7.3-1.1.x86_64", "product_id": "xalan-j2-demo-2.7.3-1.1.x86_64" } }, { "category": "product_version", "name": "xalan-j2-manual-2.7.3-1.1.x86_64", "product": { "name": "xalan-j2-manual-2.7.3-1.1.x86_64", "product_id": "xalan-j2-manual-2.7.3-1.1.x86_64" } }, { "category": "product_version", "name": "xalan-j2-xsltc-2.7.3-1.1.x86_64", "product": { "name": "xalan-j2-xsltc-2.7.3-1.1.x86_64", "product_id": "xalan-j2-xsltc-2.7.3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.aarch64" }, "product_reference": "xalan-j2-2.7.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.ppc64le" }, "product_reference": "xalan-j2-2.7.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.s390x" }, "product_reference": "xalan-j2-2.7.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.x86_64" }, "product_reference": "xalan-j2-2.7.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-demo-2.7.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.aarch64" }, "product_reference": "xalan-j2-demo-2.7.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-demo-2.7.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.ppc64le" }, "product_reference": "xalan-j2-demo-2.7.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-demo-2.7.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.s390x" }, "product_reference": "xalan-j2-demo-2.7.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-demo-2.7.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.x86_64" }, "product_reference": "xalan-j2-demo-2.7.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-manual-2.7.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.aarch64" }, "product_reference": "xalan-j2-manual-2.7.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-manual-2.7.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.ppc64le" }, "product_reference": "xalan-j2-manual-2.7.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-manual-2.7.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.s390x" }, "product_reference": "xalan-j2-manual-2.7.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-manual-2.7.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.x86_64" }, "product_reference": "xalan-j2-manual-2.7.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-xsltc-2.7.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.aarch64" }, "product_reference": "xalan-j2-xsltc-2.7.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-xsltc-2.7.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.ppc64le" }, "product_reference": "xalan-j2-xsltc-2.7.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-xsltc-2.7.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.s390x" }, "product_reference": "xalan-j2-xsltc-2.7.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-xsltc-2.7.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.x86_64" }, "product_reference": "xalan-j2-xsltc-2.7.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-demo-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-manual-2.7.3-1.1.x86_64", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.aarch64", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.ppc64le", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.s390x", "openSUSE Tumbleweed:xalan-j2-xsltc-2.7.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12263-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-1_8_0-openj9-1.8.0.345-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-1_8_0-openj9-1.8.0.345-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12263", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12263-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-1_8_0-openj9-1.8.0.345-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12263-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openj9-src-1.8.0.345-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openj9-src-1.8.0.345-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12261-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-11-openj9-11.0.16.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-11-openj9-11.0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12261", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12261-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-11-openj9-11.0.16.0-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12261-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-accessibility-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-demo-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-demo-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-devel-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-devel-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-headless-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-headless-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-javadoc-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-jmods-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openj9-src-11.0.16.0-1.1.aarch64", "product_id": "java-11-openj9-src-11.0.16.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-demo-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-devel-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-headless-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-jmods-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openj9-src-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openj9-src-11.0.16.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-accessibility-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-demo-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-demo-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-devel-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-devel-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-headless-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-headless-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-javadoc-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-jmods-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openj9-src-11.0.16.0-1.1.s390x", "product_id": "java-11-openj9-src-11.0.16.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-accessibility-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-demo-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-demo-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-devel-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-devel-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-headless-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-headless-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-javadoc-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-jmods-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openj9-src-11.0.16.0-1.1.x86_64", "product_id": "java-11-openj9-src-11.0.16.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-accessibility-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-demo-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-demo-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-demo-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-devel-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-devel-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-devel-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-headless-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-headless-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-headless-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-javadoc-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-jmods-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openj9-src-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openj9-src-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openj9-src-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openj9-src-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openj9-src-11.0.16.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12234-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-1_8_0-openjdk-1.8.0.345-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.345-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12234", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12234-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-1_8_0-openjdk-1.8.0.345-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12234-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.345-1.1.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.345-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12208-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-17-openjdk-17.0.4.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-17-openjdk-17.0.4.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12208", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12208-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-17-openjdk-17.0.4.0-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12208-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-demo-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-devel-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-headless-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-jmods-17.0.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-1.1.aarch64", "product": { "name": "java-17-openjdk-src-17.0.4.0-1.1.aarch64", "product_id": "java-17-openjdk-src-17.0.4.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-demo-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-devel-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-headless-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "product": { "name": "java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "product_id": "java-17-openjdk-src-17.0.4.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-accessibility-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-demo-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-devel-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-headless-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-javadoc-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-jmods-17.0.4.0-1.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-1.1.s390x", "product": { "name": "java-17-openjdk-src-17.0.4.0-1.1.s390x", "product_id": "java-17-openjdk-src-17.0.4.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-demo-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-devel-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-headless-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-jmods-17.0.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-1.1.x86_64", "product": { "name": "java-17-openjdk-src-17.0.4.0-1.1.x86_64", "product_id": "java-17-openjdk-src-17.0.4.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64" }, "product_reference": "java-17-openjdk-src-17.0.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le" }, "product_reference": "java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x" }, "product_reference": "java-17-openjdk-src-17.0.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" }, "product_reference": "java-17-openjdk-src-17.0.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-accessibility-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-demo-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-devel-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-headless-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-javadoc-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-jmods-17.0.4.0-1.1.x86_64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.aarch64", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.ppc64le", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.s390x", "openSUSE Tumbleweed:java-17-openjdk-src-17.0.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12207-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-11-openjdk-11.0.16.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-11-openjdk-11.0.16.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12207", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12207-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-11-openjdk-11.0.16.0-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12207-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.16.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-1.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.16.0-1.1.aarch64", "product_id": "java-11-openjdk-src-11.0.16.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.16.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-demo-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-devel-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-headless-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-javadoc-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.16.0-1.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-1.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.16.0-1.1.s390x", "product_id": "java-11-openjdk-src-11.0.16.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.16.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-1.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.16.0-1.1.x86_64", "product_id": "java-11-openjdk-src-11.0.16.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64" }, "product_reference": "java-11-openjdk-src-11.0.16.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le" }, "product_reference": "java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x" }, "product_reference": "java-11-openjdk-src-11.0.16.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.16.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.16.0-1.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.16.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:14174-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.3-rubygem-nokogiri-1.15.5-1.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.3-rubygem-nokogiri-1.15.5-1.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14174", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14174-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2877 page", "url": "https://www.suse.com/security/cve/CVE-2013-2877/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0191 page", "url": "https://www.suse.com/security/cve/CVE-2014-0191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1819 page", "url": "https://www.suse.com/security/cve/CVE-2015-1819/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5312 page", "url": "https://www.suse.com/security/cve/CVE-2015-5312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7497 page", "url": "https://www.suse.com/security/cve/CVE-2015-7497/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7498 page", "url": "https://www.suse.com/security/cve/CVE-2015-7498/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7499 page", "url": "https://www.suse.com/security/cve/CVE-2015-7499/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7500 page", "url": "https://www.suse.com/security/cve/CVE-2015-7500/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7941 page", "url": "https://www.suse.com/security/cve/CVE-2015-7941/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7942 page", "url": "https://www.suse.com/security/cve/CVE-2015-7942/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7995 page", "url": "https://www.suse.com/security/cve/CVE-2015-7995/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8035 page", "url": "https://www.suse.com/security/cve/CVE-2015-8035/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8241 page", "url": "https://www.suse.com/security/cve/CVE-2015-8241/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8242 page", "url": "https://www.suse.com/security/cve/CVE-2015-8242/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8317 page", "url": "https://www.suse.com/security/cve/CVE-2015-8317/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4658 page", "url": "https://www.suse.com/security/cve/CVE-2016-4658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4738 page", "url": "https://www.suse.com/security/cve/CVE-2016-4738/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5131 page", "url": "https://www.suse.com/security/cve/CVE-2016-5131/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15412 page", "url": "https://www.suse.com/security/cve/CVE-2017-15412/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5029 page", "url": "https://www.suse.com/security/cve/CVE-2017-5029/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14404 page", "url": "https://www.suse.com/security/cve/CVE-2018-14404/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-25032 page", "url": "https://www.suse.com/security/cve/CVE-2018-25032/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8048 page", "url": "https://www.suse.com/security/cve/CVE-2018-8048/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11068 page", "url": "https://www.suse.com/security/cve/CVE-2019-11068/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20388 page", "url": "https://www.suse.com/security/cve/CVE-2019-20388/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5477 page", "url": "https://www.suse.com/security/cve/CVE-2019-5477/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24977 page", "url": "https://www.suse.com/security/cve/CVE-2020-24977/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7595 page", "url": "https://www.suse.com/security/cve/CVE-2020-7595/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30560 page", "url": "https://www.suse.com/security/cve/CVE-2021-30560/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3516 page", "url": "https://www.suse.com/security/cve/CVE-2021-3516/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3517 page", "url": "https://www.suse.com/security/cve/CVE-2021-3517/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3518 page", "url": "https://www.suse.com/security/cve/CVE-2021-3518/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3537 page", "url": "https://www.suse.com/security/cve/CVE-2021-3537/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3541 page", "url": "https://www.suse.com/security/cve/CVE-2021-3541/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41098 page", "url": "https://www.suse.com/security/cve/CVE-2021-41098/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23308 page", "url": "https://www.suse.com/security/cve/CVE-2022-23308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23437 page", "url": "https://www.suse.com/security/cve/CVE-2022-23437/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23476 page", "url": "https://www.suse.com/security/cve/CVE-2022-23476/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24836 page", "url": "https://www.suse.com/security/cve/CVE-2022-24836/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24839 page", "url": "https://www.suse.com/security/cve/CVE-2022-24839/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29181 page", "url": "https://www.suse.com/security/cve/CVE-2022-29181/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29824 page", "url": "https://www.suse.com/security/cve/CVE-2022-29824/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-29469 page", "url": "https://www.suse.com/security/cve/CVE-2023-29469/" } ], "title": "ruby3.3-rubygem-nokogiri-1.15.5-1.5 on GA media", "tracking": { "current_release_date": "2024-07-12T00:00:00Z", "generator": { "date": "2024-07-12T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14174-1", "initial_release_date": "2024-07-12T00:00:00Z", "revision_history": [ { "date": "2024-07-12T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "product": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "product_id": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "product": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "product_id": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "product": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "product_id": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64", "product": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64", "product_id": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64" }, "product_reference": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le" }, "product_reference": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x" }, "product_reference": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" }, "product_reference": "ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2877" } ], "notes": [ { "category": "general", "text": "parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2877", "url": "https://www.suse.com/security/cve/CVE-2013-2877" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2013-2877", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 828893 for CVE-2013-2877", "url": "https://bugzilla.suse.com/828893" }, { "category": "external", "summary": "SUSE Bug 829077 for CVE-2013-2877", "url": "https://bugzilla.suse.com/829077" }, { "category": "external", "summary": "SUSE Bug 854869 for CVE-2013-2877", "url": "https://bugzilla.suse.com/854869" }, { "category": "external", "summary": "SUSE Bug 877506 for CVE-2013-2877", "url": "https://bugzilla.suse.com/877506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "critical" } ], "title": "CVE-2013-2877" }, { "cve": "CVE-2014-0191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0191" } ], "notes": [ { "category": "general", "text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0191", "url": "https://www.suse.com/security/cve/CVE-2014-0191" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2014-0191", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2014-0191", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 876652 for CVE-2014-0191", "url": "https://bugzilla.suse.com/876652" }, { "category": "external", "summary": "SUSE Bug 877506 for CVE-2014-0191", "url": "https://bugzilla.suse.com/877506" }, { "category": "external", "summary": "SUSE Bug 996079 for CVE-2014-0191", "url": "https://bugzilla.suse.com/996079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0191" }, { "cve": "CVE-2015-1819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1819" } ], "notes": [ { "category": "general", "text": "The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1819", "url": "https://www.suse.com/security/cve/CVE-2015-1819" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-1819", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 928193 for CVE-2015-1819", "url": "https://bugzilla.suse.com/928193" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-1819", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1819" }, { "cve": "CVE-2015-5312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5312" } ], "notes": [ { "category": "general", "text": "The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5312", "url": "https://www.suse.com/security/cve/CVE-2015-5312" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-5312", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957105 for CVE-2015-5312", "url": "https://bugzilla.suse.com/957105" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-5312", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-5312", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5312" }, { "cve": "CVE-2015-7497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7497" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7497", "url": "https://www.suse.com/security/cve/CVE-2015-7497" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7497", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957106 for CVE-2015-7497", "url": "https://bugzilla.suse.com/957106" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7497", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7497", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7497" }, { "cve": "CVE-2015-7498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7498" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7498", "url": "https://www.suse.com/security/cve/CVE-2015-7498" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7498", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957107 for CVE-2015-7498", "url": "https://bugzilla.suse.com/957107" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7498", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7498", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7498" }, { "cve": "CVE-2015-7499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7499" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7499", "url": "https://www.suse.com/security/cve/CVE-2015-7499" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7499", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957109 for CVE-2015-7499", "url": "https://bugzilla.suse.com/957109" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7499", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7499", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7499" }, { "cve": "CVE-2015-7500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7500" } ], "notes": [ { "category": "general", "text": "The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7500", "url": "https://www.suse.com/security/cve/CVE-2015-7500" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7500", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957110 for CVE-2015-7500", "url": "https://bugzilla.suse.com/957110" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7500", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7500", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7500" }, { "cve": "CVE-2015-7941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7941" } ], "notes": [ { "category": "general", "text": "libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7941", "url": "https://www.suse.com/security/cve/CVE-2015-7941" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7941", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 951734 for CVE-2015-7941", "url": "https://bugzilla.suse.com/951734" }, { "category": "external", "summary": "SUSE Bug 951735 for CVE-2015-7941", "url": "https://bugzilla.suse.com/951735" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7941", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7941" }, { "cve": "CVE-2015-7942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7942" } ], "notes": [ { "category": "general", "text": "The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7942", "url": "https://www.suse.com/security/cve/CVE-2015-7942" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7942", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 951735 for CVE-2015-7942", "url": "https://bugzilla.suse.com/951735" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7942", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7942" }, { "cve": "CVE-2015-7995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7995" } ], "notes": [ { "category": "general", "text": "The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a \"type confusion\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7995", "url": "https://www.suse.com/security/cve/CVE-2015-7995" }, { "category": "external", "summary": "SUSE Bug 1123130 for CVE-2015-7995", "url": "https://bugzilla.suse.com/1123130" }, { "category": "external", "summary": "SUSE Bug 952474 for CVE-2015-7995", "url": "https://bugzilla.suse.com/952474" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7995" }, { "cve": "CVE-2015-8035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8035" } ], "notes": [ { "category": "general", "text": "The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8035", "url": "https://www.suse.com/security/cve/CVE-2015-8035" }, { "category": "external", "summary": "SUSE Bug 1088279 for CVE-2015-8035", "url": "https://bugzilla.suse.com/1088279" }, { "category": "external", "summary": "SUSE Bug 1105166 for CVE-2015-8035", "url": "https://bugzilla.suse.com/1105166" }, { "category": "external", "summary": "SUSE Bug 954429 for CVE-2015-8035", "url": "https://bugzilla.suse.com/954429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "low" } ], "title": "CVE-2015-8035" }, { "cve": "CVE-2015-8241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8241" } ], "notes": [ { "category": "general", "text": "The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8241", "url": "https://www.suse.com/security/cve/CVE-2015-8241" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-8241", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 956018 for CVE-2015-8241", "url": "https://bugzilla.suse.com/956018" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-8241", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-8241", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8241" }, { "cve": "CVE-2015-8242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8242" } ], "notes": [ { "category": "general", "text": "The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8242", "url": "https://www.suse.com/security/cve/CVE-2015-8242" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-8242", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 956021 for CVE-2015-8242", "url": "https://bugzilla.suse.com/956021" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-8242", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-8242", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8242" }, { "cve": "CVE-2015-8317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8317" } ], "notes": [ { "category": "general", "text": "The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8317", "url": "https://www.suse.com/security/cve/CVE-2015-8317" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-8317", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 956260 for CVE-2015-8317", "url": "https://bugzilla.suse.com/956260" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-8317", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-8317", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8317" }, { "cve": "CVE-2016-4658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4658" } ], "notes": [ { "category": "general", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4658", "url": "https://www.suse.com/security/cve/CVE-2016-4658" }, { "category": "external", "summary": "SUSE Bug 1005544 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1005544" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1078813 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1078813" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-4738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4738" } ], "notes": [ { "category": "general", "text": "libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4738", "url": "https://www.suse.com/security/cve/CVE-2016-4738" }, { "category": "external", "summary": "SUSE Bug 1005591 for CVE-2016-4738", "url": "https://bugzilla.suse.com/1005591" }, { "category": "external", "summary": "SUSE Bug 1123130 for CVE-2016-4738", "url": "https://bugzilla.suse.com/1123130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4738" }, { "cve": "CVE-2016-5131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5131" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5131", "url": "https://www.suse.com/security/cve/CVE-2016-5131" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1078813 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1078813" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5131", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2017-15412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15412" } ], "notes": [ { "category": "general", "text": "Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15412", "url": "https://www.suse.com/security/cve/CVE-2017-15412" }, { "category": "external", "summary": "SUSE Bug 1071691 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1071691" }, { "category": "external", "summary": "SUSE Bug 1077993 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1077993" }, { "category": "external", "summary": "SUSE Bug 1123129 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1123129" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15412" }, { "cve": "CVE-2017-5029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5029" } ], "notes": [ { "category": "general", "text": "The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5029", "url": "https://www.suse.com/security/cve/CVE-2017-5029" }, { "category": "external", "summary": "SUSE Bug 1028848 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1028848" }, { "category": "external", "summary": "SUSE Bug 1028875 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1028875" }, { "category": "external", "summary": "SUSE Bug 1035905 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1035905" }, { "category": "external", "summary": "SUSE Bug 1123130 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1123130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "low" } ], "title": "CVE-2017-5029" }, { "cve": "CVE-2018-14404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14404" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14404", "url": "https://www.suse.com/security/cve/CVE-2018-14404" }, { "category": "external", "summary": "SUSE Bug 1102046 for CVE-2018-14404", "url": "https://bugzilla.suse.com/1102046" }, { "category": "external", "summary": "SUSE Bug 1148896 for CVE-2018-14404", "url": "https://bugzilla.suse.com/1148896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14404" }, { "cve": "CVE-2018-25032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-25032" } ], "notes": [ { "category": "general", "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-25032", "url": "https://www.suse.com/security/cve/CVE-2018-25032" }, { "category": "external", "summary": "SUSE Bug 1197459 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1197459" }, { "category": "external", "summary": "SUSE Bug 1197893 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1197893" }, { "category": "external", "summary": "SUSE Bug 1198667 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1198667" }, { "category": "external", "summary": "SUSE Bug 1199104 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1199104" }, { "category": "external", "summary": "SUSE Bug 1200049 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1200049" }, { "category": "external", "summary": "SUSE Bug 1201732 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1201732" }, { "category": "external", "summary": "SUSE Bug 1202688 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1202688" }, { "category": "external", "summary": "SUSE Bug 1224427 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1224427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2018-25032" }, { "cve": "CVE-2018-8048", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8048" } ], "notes": [ { "category": "general", "text": "In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8048", "url": "https://www.suse.com/security/cve/CVE-2018-8048" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-8048", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-8048", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8048" }, { "cve": "CVE-2019-11068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11068" } ], "notes": [ { "category": "general", "text": "libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11068", "url": "https://www.suse.com/security/cve/CVE-2019-11068" }, { "category": "external", "summary": "SUSE Bug 1132160 for CVE-2019-11068", "url": "https://bugzilla.suse.com/1132160" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-11068", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11068" }, { "cve": "CVE-2019-20388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20388" } ], "notes": [ { "category": "general", "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20388", "url": "https://www.suse.com/security/cve/CVE-2019-20388" }, { "category": "external", "summary": "SUSE Bug 1161521 for CVE-2019-20388", "url": "https://bugzilla.suse.com/1161521" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2019-20388", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "low" } ], "title": "CVE-2019-20388" }, { "cve": "CVE-2019-5477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5477" } ], "notes": [ { "category": "general", "text": "A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby\u0027s `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5477", "url": "https://www.suse.com/security/cve/CVE-2019-5477" }, { "category": "external", "summary": "SUSE Bug 1146578 for CVE-2019-5477", "url": "https://bugzilla.suse.com/1146578" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2019-5477" }, { "cve": "CVE-2020-24977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24977" } ], "notes": [ { "category": "general", "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24977", "url": "https://www.suse.com/security/cve/CVE-2020-24977" }, { "category": "external", "summary": "SUSE Bug 1176179 for CVE-2020-24977", "url": "https://bugzilla.suse.com/1176179" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2020-24977", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24977" }, { "cve": "CVE-2020-7595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7595" } ], "notes": [ { "category": "general", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7595", "url": "https://www.suse.com/security/cve/CVE-2020-7595" }, { "category": "external", "summary": "SUSE Bug 1161517 for CVE-2020-7595", "url": "https://bugzilla.suse.com/1161517" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2020-7595", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-7595" }, { "cve": "CVE-2021-30560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30560" } ], "notes": [ { "category": "general", "text": "Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30560", "url": "https://www.suse.com/security/cve/CVE-2021-30560" }, { "category": "external", "summary": "SUSE Bug 1188373 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1188373" }, { "category": "external", "summary": "SUSE Bug 1208574 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1208574" }, { "category": "external", "summary": "SUSE Bug 1211500 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1211500" }, { "category": "external", "summary": "SUSE Bug 1211501 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1211501" }, { "category": "external", "summary": "SUSE Bug 1211544 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1211544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3516" } ], "notes": [ { "category": "general", "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3516", "url": "https://www.suse.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "SUSE Bug 1185409 for CVE-2021-3516", "url": "https://bugzilla.suse.com/1185409" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2021-3516", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3516" }, { "cve": "CVE-2021-3517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3517" } ], "notes": [ { "category": "general", "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3517", "url": "https://www.suse.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "SUSE Bug 1185410 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1185410" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1191860" }, { "category": "external", "summary": "SUSE Bug 1194438 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1194438" }, { "category": "external", "summary": "SUSE Bug 1196383 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1196383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3517" }, { "cve": "CVE-2021-3518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3518" } ], "notes": [ { "category": "general", "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3518", "url": "https://www.suse.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "SUSE Bug 1185408 for CVE-2021-3518", "url": "https://bugzilla.suse.com/1185408" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2021-3518", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3537" } ], "notes": [ { "category": "general", "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3537", "url": "https://www.suse.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "SUSE Bug 1185698 for CVE-2021-3537", "url": "https://bugzilla.suse.com/1185698" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3541" } ], "notes": [ { "category": "general", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3541", "url": "https://www.suse.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "SUSE Bug 1186015 for CVE-2021-3541", "url": "https://bugzilla.suse.com/1186015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3541" }, { "cve": "CVE-2021-41098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41098" } ], "notes": [ { "category": "general", "text": "Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41098", "url": "https://www.suse.com/security/cve/CVE-2021-41098" }, { "category": "external", "summary": "SUSE Bug 1191029 for CVE-2021-41098", "url": "https://bugzilla.suse.com/1191029" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41098" }, { "cve": "CVE-2022-23308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23308" } ], "notes": [ { "category": "general", "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23308", "url": "https://www.suse.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "SUSE Bug 1196490 for CVE-2022-23308", "url": "https://bugzilla.suse.com/1196490" }, { "category": "external", "summary": "SUSE Bug 1199098 for CVE-2022-23308", "url": "https://bugzilla.suse.com/1199098" }, { "category": "external", "summary": "SUSE Bug 1202688 for CVE-2022-23308", "url": "https://bugzilla.suse.com/1202688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23437" } ], "notes": [ { "category": "general", "text": "There\u0027s a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23437", "url": "https://www.suse.com/security/cve/CVE-2022-23437" }, { "category": "external", "summary": "SUSE Bug 1195108 for CVE-2022-23437", "url": "https://bugzilla.suse.com/1195108" }, { "category": "external", "summary": "SUSE Bug 1196394 for CVE-2022-23437", "url": "https://bugzilla.suse.com/1196394" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23437" }, { "cve": "CVE-2022-23476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23476" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `\u003e= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23476", "url": "https://www.suse.com/security/cve/CVE-2022-23476" }, { "category": "external", "summary": "SUSE Bug 1206227 for CVE-2022-23476", "url": "https://bugzilla.suse.com/1206227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23476" }, { "cve": "CVE-2022-24836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24836" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `\u003c v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `\u003e= 1.13.4`. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24836", "url": "https://www.suse.com/security/cve/CVE-2022-24836" }, { "category": "external", "summary": "SUSE Bug 1198408 for CVE-2022-24836", "url": "https://bugzilla.suse.com/1198408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-24836" }, { "cve": "CVE-2022-24839", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24839" } ], "notes": [ { "category": "general", "text": "org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `\u003e= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24839", "url": "https://www.suse.com/security/cve/CVE-2022-24839" }, { "category": "external", "summary": "SUSE Bug 1198404 for CVE-2022-24839", "url": "https://bugzilla.suse.com/1198404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-24839" }, { "cve": "CVE-2022-29181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29181" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29181", "url": "https://www.suse.com/security/cve/CVE-2022-29181" }, { "category": "external", "summary": "SUSE Bug 1199782 for CVE-2022-29181", "url": "https://bugzilla.suse.com/1199782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-29181" }, { "cve": "CVE-2022-29824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29824" } ], "notes": [ { "category": "general", "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29824", "url": "https://www.suse.com/security/cve/CVE-2022-29824" }, { "category": "external", "summary": "SUSE Bug 1199132 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1199132" }, { "category": "external", "summary": "SUSE Bug 1202878 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1202878" }, { "category": "external", "summary": "SUSE Bug 1204121 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1204121" }, { "category": "external", "summary": "SUSE Bug 1204131 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1204131" }, { "category": "external", "summary": "SUSE Bug 1205069 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1205069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-29824" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-29469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-29469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-29469", "url": "https://www.suse.com/security/cve/CVE-2023-29469" }, { "category": "external", "summary": "SUSE Bug 1210412 for CVE-2023-29469", "url": "https://bugzilla.suse.com/1210412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-nokogiri-1.15.5-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-29469" } ] }
opensuse-su-2024:12202-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-15-openjdk-15.0.8.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-15-openjdk-15.0.8.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12202", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12202-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-15-openjdk-15.0.8.0-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12202-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-demo-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-devel-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-headless-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-jmods-15.0.8.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.8.0-1.1.aarch64", "product": { "name": "java-15-openjdk-src-15.0.8.0-1.1.aarch64", "product_id": "java-15-openjdk-src-15.0.8.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-demo-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-devel-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-headless-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "product": { "name": "java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "product_id": "java-15-openjdk-src-15.0.8.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-accessibility-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-demo-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-devel-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-headless-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-javadoc-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-jmods-15.0.8.0-1.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.8.0-1.1.s390x", "product": { "name": "java-15-openjdk-src-15.0.8.0-1.1.s390x", "product_id": "java-15-openjdk-src-15.0.8.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-demo-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-devel-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-headless-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-jmods-15.0.8.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.8.0-1.1.x86_64", "product": { "name": "java-15-openjdk-src-15.0.8.0-1.1.x86_64", "product_id": "java-15-openjdk-src-15.0.8.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-demo-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-devel-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-headless-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.8.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64" }, "product_reference": "java-15-openjdk-src-15.0.8.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.8.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le" }, "product_reference": "java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.8.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x" }, "product_reference": "java-15-openjdk-src-15.0.8.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.8.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" }, "product_reference": "java-15-openjdk-src-15.0.8.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.8.0-1.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.8.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12201-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-13-openjdk-13.0.12.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-13-openjdk-13.0.12.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12201", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12201-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-13-openjdk-13.0.12.0-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12201-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-demo-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-devel-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-headless-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-jmods-13.0.12.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.12.0-1.1.aarch64", "product": { "name": "java-13-openjdk-src-13.0.12.0-1.1.aarch64", "product_id": "java-13-openjdk-src-13.0.12.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-demo-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-devel-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-headless-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "product": { "name": "java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "product_id": "java-13-openjdk-src-13.0.12.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-accessibility-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-demo-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-devel-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-headless-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-javadoc-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-jmods-13.0.12.0-1.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.12.0-1.1.s390x", "product": { "name": "java-13-openjdk-src-13.0.12.0-1.1.s390x", "product_id": "java-13-openjdk-src-13.0.12.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-demo-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-devel-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-headless-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-jmods-13.0.12.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.12.0-1.1.x86_64", "product": { "name": "java-13-openjdk-src-13.0.12.0-1.1.x86_64", "product_id": "java-13-openjdk-src-13.0.12.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-demo-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-devel-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-headless-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.12.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64" }, "product_reference": "java-13-openjdk-src-13.0.12.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.12.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le" }, "product_reference": "java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.12.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x" }, "product_reference": "java-13-openjdk-src-13.0.12.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.12.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" }, "product_reference": "java-13-openjdk-src-13.0.12.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.12.0-1.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.12.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:12203-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-18-openjdk-18.0.2.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-18-openjdk-18.0.2.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12203", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12203-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "java-18-openjdk-18.0.2.0-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12203-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-18-openjdk-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-demo-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-devel-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-headless-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-jmods-18.0.2.0-1.1.aarch64" } }, { "category": "product_version", "name": "java-18-openjdk-src-18.0.2.0-1.1.aarch64", "product": { "name": "java-18-openjdk-src-18.0.2.0-1.1.aarch64", "product_id": "java-18-openjdk-src-18.0.2.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-18-openjdk-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-demo-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-devel-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-headless-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le" } }, { "category": "product_version", "name": "java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "product": { "name": "java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "product_id": "java-18-openjdk-src-18.0.2.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-18-openjdk-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-accessibility-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-demo-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-demo-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-devel-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-devel-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-headless-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-headless-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-javadoc-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-jmods-18.0.2.0-1.1.s390x" } }, { "category": "product_version", "name": "java-18-openjdk-src-18.0.2.0-1.1.s390x", "product": { "name": "java-18-openjdk-src-18.0.2.0-1.1.s390x", "product_id": "java-18-openjdk-src-18.0.2.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-18-openjdk-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-demo-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-devel-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-headless-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-jmods-18.0.2.0-1.1.x86_64" } }, { "category": "product_version", "name": "java-18-openjdk-src-18.0.2.0-1.1.x86_64", "product": { "name": "java-18-openjdk-src-18.0.2.0-1.1.x86_64", "product_id": "java-18-openjdk-src-18.0.2.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-demo-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-demo-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-devel-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-devel-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-headless-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-headless-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-jmods-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-src-18.0.2.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64" }, "product_reference": "java-18-openjdk-src-18.0.2.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-src-18.0.2.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le" }, "product_reference": "java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-src-18.0.2.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x" }, "product_reference": "java-18-openjdk-src-18.0.2.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-18-openjdk-src-18.0.2.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" }, "product_reference": "java-18-openjdk-src-18.0.2.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-accessibility-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-demo-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-devel-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-headless-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-javadoc-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-jmods-18.0.2.0-1.1.x86_64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.aarch64", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.ppc64le", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.s390x", "openSUSE Tumbleweed:java-18-openjdk-src-18.0.2.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
opensuse-su-2024:13440-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.2-rubygem-nokogiri-1.15.4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.2-rubygem-nokogiri-1.15.4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13440", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13440-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23476 page", "url": "https://www.suse.com/security/cve/CVE-2022-23476/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-29469 page", "url": "https://www.suse.com/security/cve/CVE-2023-29469/" } ], "title": "ruby3.2-rubygem-nokogiri-1.15.4-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13440-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "product": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "product_id": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "product": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "product_id": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "product": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "product_id": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64", "product": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64", "product_id": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64" }, "product_reference": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le" }, "product_reference": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x" }, "product_reference": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" }, "product_reference": "ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23476" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `\u003e= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23476", "url": "https://www.suse.com/security/cve/CVE-2022-23476" }, { "category": "external", "summary": "SUSE Bug 1206227 for CVE-2022-23476", "url": "https://bugzilla.suse.com/1206227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23476" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-29469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-29469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-29469", "url": "https://www.suse.com/security/cve/CVE-2023-29469" }, { "category": "external", "summary": "SUSE Bug 1210412 for CVE-2023-29469", "url": "https://bugzilla.suse.com/1210412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-nokogiri-1.15.4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-29469" } ] }
opensuse-su-2025:0066-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openj9", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openj9 fixes the following issues:\n\n- Update to OpenJDK 11.0.26 with OpenJ9 0.49.0 virtual machine\n- Including Oracle October 2024 and January 2025 CPU changes\n * CVE-2024-21208 (boo#1231702), CVE-2024-21210 (boo#1231711),\n CVE-2024-21217 (boo#1231716), CVE-2024-21235 (boo#1231719),\n CVE-2025-21502 (boo#1236278)\n * OpenJ9 changes, see \n https://www.eclipse.org/openj9/docs/version0.49/\n\n- Update to OpenJDK 11.0.24 with OpenJ9 0.46.0 virtual machine\n- Including Oracle July 2024 CPU changes\n * CVE-2024-21131 (boo#1228046), CVE-2024-21138 (boo#1228047),\n CVE-2024-21140 (boo#1228048), CVE-2024-21144 (boo#1228050),\n CVE-2024-21147 (boo#1228052), CVE-2024-21145 (boo#1228051)\n * OpenJ9 changes, see \n https://www.eclipse.org/openj9/docs/version0.46/\n\n- Update to OpenJDK 11.0.23 with OpenJ9 0.44.0 virtual machine\n- Including Oracle April 2024 CPU changes\n * CVE-2024-21012 (boo#1222987), CVE-2024-21094 (boo#1222986),\n CVE-2024-21011 (boo#1222979), CVE-2024-21085 (boo#1222984),\n CVE-2024-21068 (boo#1222983)\n- Including OpenJ9/OMR specific fix:\n * CVE-2024-3933 (boo#1225470)\n * OpenJ9 changes, see \n https://www.eclipse.org/openj9/docs/version0.44/\n\n- Update to OpenJDK 11.0.22 with OpenJ9 0.43.0 virtual machine\n- Including Oracle January 2024 CPU changes\n * CVE-2024-20918 (boo#1218907), CVE-2024-20919 (boo#1218903),\n CVE-2024-20921 (boo#1218905), CVE-2024-20926 (boo#1218906),\n CVE-2024-20945 (boo#1218909), CVE-2024-20952 (boo#1218911)\n * OpenJ9 changes, see \n https://www.eclipse.org/openj9/docs/version0.43/\n- Remove the possibility to put back removes JavaEE modules, since\n our Java stack does not need this hack any more\n\n- Update to OpenJDK 11.0.21 with OpenJ9 0.41.0 virtual machine\n- Including Oracle October 2023 CPU changes\n * CVE-2023-22081, boo#1216374\n- Including Openj9 0.41.0 fixes of CVE-2023-5676, boo#1217214\n * For other OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.41 \n\n- Update to OpenJDK 11.0.20.1 with OpenJ9 0.40.0 virtual machine\n * JDK-8313765: Invalid CEN header (invalid zip64 extra data\n field size)\n\n- Update to OpenJDK 11.0.20 with OpenJ9 0.40.0 virtual machine\n- Including Oracle April 2023 CPU changes\n * CVE-2023-22006 (boo#1213473), CVE-2023-22036 (boo#1213474),\n CVE-2023-22041 (boo#1213475), CVE-2023-22045 (boo#1213481),\n CVE-2023-22049 (boo#1213482), CVE-2023-25193 (boo#1207922)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.40\n\n- Update to OpenJDK 11.0.19 with OpenJ9 0.38.0 virtual machine\n- Including Oracle April 2023 CPU changes\n * CVE-2023-21930 (boo#1210628), CVE-2023-21937 (boo#1210631),\n CVE-2023-21938 (boo#1210632), CVE-2023-21939 (boo#1210634),\n CVE-2023-21954 (boo#1210635), CVE-2023-21967 (boo#1210636),\n CVE-2023-21968 (boo#1210637)\n * OpenJ9 specific vulnerability: CVE-2023-2597 (boo#1211615)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.38\n\n- Update to OpenJDK 11.0.18 with OpenJ9 0.36.1 virtual machine\n * Including Oracle January 2023 CPU changes\n + CVE-2023-21835, boo#1207246\n + CVE-2023-21843, boo#1207248\n * OpenJ9 changes, see \n https://www.eclipse.org/openj9/docs/version0.36\n\n- Update to OpenJDK 11.0.17 with OpenJ9 0.35.0 virtual machine\n * Including Oracle October 2022 CPU changes\n CVE-2022-21618 (boo#1204468), CVE-2022-21619 (boo#1204473),\n CVE-2022-21626 (boo#1204471), CVE-2022-21624 (boo#1204475),\n CVE-2022-21628 (boo#1204472), CVE-2022-39399 (boo#1204480)\n * Fixes OpenJ9 vulnerability boo#1204703, CVE-2022-3676\n * OpenJ9 changes, see \n https://www.eclipse.org/openj9/docs/version0.35\n\n- Update to OpenJDK 11.0.16 with OpenJ9 0.33.0 virtual machine\n * Including Oracle July 2022 CPU changes\n CVE-2022-21540 (boo#1201694), CVE-2022-21541 (boo#1201692),\n CVE-2022-34169 (boo#1201684)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.33\n\n- Update to OpenJDK 11.0.15 with OpenJ9 0.32.0 virtual machine\n * Fixes boo#1198935, CVE-2021-41041: unverified methods can be\n invoked using MethodHandles\n * Including Oracle April 2022 CPU fixes\n CVE-2022-21426 (boo#1198672), CVE-2022-21434 (boo#1198674),\n CVE-2022-21443 (boo#1198675), CVE-2022-21476 (boo#1198671),\n CVE-2022-21496 (boo#1198673)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.32\n\n- Update to OpenJDK 11.0.14.1 with OpenJ9 0.30.1 virtual machine\n * including Oracle January 2022 CPU changes (boo#1194925,\n boo#1194926, boo#1194927, boo#1194928, boo#1194929, boo#1194930,\n boo#1194931, boo#1194932, boo#1194933, boo#1194934, boo#1194935,\n boo#1194937, boo#1194939, boo#1194940, boo#1194941)\n * OpenJ9 changes see\n https://www.eclipse.org/openj9/docs/version0.30.1\n\n- Update to OpenJDK 11.0.13 with OpenJ9 0.29.0 virtual machine\n * including Oracle July 2021 and October 2021 CPU changes\n (boo#1188564, boo#1188565, boo#1188566, boo#1191901,\n boo#1191909, boo#1191910, boo#1191911, boo#1191912,\n boo#1191913, boo#1191903, boo#1191904, boo#1191914,\n boo#1191906)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.29\n\n- Update to OpenJDK 11.0.11 with OpenJ9 0.26.0 virtual machine\n * including Oracle April 2021 CPU changes (boo#1185055 and\n boo#1185056)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.26\n\n- Update to OpenJDK 11.0.10 with OpenJ9 0.24.0 virtual machine\n * including Oracle January 2021 CPU changes (boo#1181239)\n * OpenJ9 changes, see\n https://www.eclipse.org/openj9/docs/version0.24\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2025-66", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_0066-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:0066-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:0066-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" }, { "category": "self", "summary": "SUSE Bug 1181239", "url": "https://bugzilla.suse.com/1181239" }, { "category": "self", "summary": "SUSE Bug 1185055", "url": "https://bugzilla.suse.com/1185055" }, { "category": "self", "summary": "SUSE Bug 1185056", "url": "https://bugzilla.suse.com/1185056" }, { "category": "self", "summary": "SUSE Bug 1188564", "url": "https://bugzilla.suse.com/1188564" }, { "category": "self", "summary": "SUSE Bug 1188565", "url": "https://bugzilla.suse.com/1188565" }, { "category": "self", "summary": "SUSE Bug 1188566", "url": "https://bugzilla.suse.com/1188566" }, { "category": "self", "summary": "SUSE Bug 1191901", "url": "https://bugzilla.suse.com/1191901" }, { "category": "self", "summary": "SUSE Bug 1191903", "url": "https://bugzilla.suse.com/1191903" }, { "category": "self", "summary": "SUSE Bug 1191904", "url": "https://bugzilla.suse.com/1191904" }, { "category": "self", "summary": "SUSE Bug 1191906", "url": "https://bugzilla.suse.com/1191906" }, { "category": "self", "summary": "SUSE Bug 1191909", "url": "https://bugzilla.suse.com/1191909" }, { "category": "self", "summary": "SUSE Bug 1191910", "url": "https://bugzilla.suse.com/1191910" }, { "category": "self", "summary": "SUSE Bug 1191911", "url": "https://bugzilla.suse.com/1191911" }, { "category": "self", "summary": "SUSE Bug 1191912", "url": "https://bugzilla.suse.com/1191912" }, { "category": "self", "summary": "SUSE Bug 1191913", "url": "https://bugzilla.suse.com/1191913" }, { "category": "self", "summary": "SUSE Bug 1191914", "url": "https://bugzilla.suse.com/1191914" }, { "category": "self", "summary": "SUSE Bug 1194925", "url": "https://bugzilla.suse.com/1194925" }, { "category": "self", "summary": "SUSE Bug 1194926", "url": "https://bugzilla.suse.com/1194926" }, { "category": "self", "summary": "SUSE Bug 1194927", "url": "https://bugzilla.suse.com/1194927" }, { "category": "self", "summary": "SUSE Bug 1194928", "url": "https://bugzilla.suse.com/1194928" }, { "category": "self", "summary": "SUSE Bug 1194929", "url": "https://bugzilla.suse.com/1194929" }, { "category": "self", "summary": "SUSE Bug 1194930", "url": "https://bugzilla.suse.com/1194930" }, { "category": "self", "summary": "SUSE Bug 1194931", "url": "https://bugzilla.suse.com/1194931" }, { "category": "self", "summary": "SUSE Bug 1194932", "url": "https://bugzilla.suse.com/1194932" }, { "category": "self", "summary": "SUSE Bug 1194933", "url": "https://bugzilla.suse.com/1194933" }, { "category": "self", "summary": "SUSE Bug 1194934", "url": "https://bugzilla.suse.com/1194934" }, { "category": "self", "summary": "SUSE Bug 1194935", "url": "https://bugzilla.suse.com/1194935" }, { "category": "self", "summary": "SUSE Bug 1194937", "url": "https://bugzilla.suse.com/1194937" }, { "category": "self", "summary": "SUSE Bug 1194939", "url": "https://bugzilla.suse.com/1194939" }, { "category": "self", "summary": "SUSE Bug 1194940", "url": "https://bugzilla.suse.com/1194940" }, { "category": "self", "summary": "SUSE Bug 1194941", "url": "https://bugzilla.suse.com/1194941" }, { "category": "self", "summary": "SUSE Bug 1198671", "url": "https://bugzilla.suse.com/1198671" }, { "category": "self", "summary": "SUSE Bug 1198672", "url": "https://bugzilla.suse.com/1198672" }, { "category": "self", "summary": "SUSE Bug 1198673", "url": "https://bugzilla.suse.com/1198673" }, { "category": "self", "summary": "SUSE Bug 1198674", "url": "https://bugzilla.suse.com/1198674" }, { "category": "self", "summary": "SUSE Bug 1198675", "url": "https://bugzilla.suse.com/1198675" }, { "category": "self", "summary": "SUSE Bug 1198935", "url": "https://bugzilla.suse.com/1198935" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE Bug 1204468", "url": "https://bugzilla.suse.com/1204468" }, { "category": "self", "summary": "SUSE Bug 1204471", "url": "https://bugzilla.suse.com/1204471" }, { "category": "self", "summary": "SUSE Bug 1204472", "url": "https://bugzilla.suse.com/1204472" }, { "category": "self", "summary": "SUSE Bug 1204473", "url": "https://bugzilla.suse.com/1204473" }, { "category": "self", "summary": "SUSE Bug 1204475", "url": "https://bugzilla.suse.com/1204475" }, { "category": "self", "summary": "SUSE Bug 1204480", "url": "https://bugzilla.suse.com/1204480" }, { "category": "self", "summary": "SUSE Bug 1204703", "url": "https://bugzilla.suse.com/1204703" }, { "category": "self", "summary": "SUSE Bug 1206549", "url": "https://bugzilla.suse.com/1206549" }, { "category": "self", "summary": "SUSE Bug 1207246", "url": "https://bugzilla.suse.com/1207246" }, { "category": "self", "summary": "SUSE Bug 1207248", "url": "https://bugzilla.suse.com/1207248" }, { "category": "self", "summary": "SUSE Bug 1207922", "url": "https://bugzilla.suse.com/1207922" }, { "category": "self", "summary": "SUSE Bug 1210628", "url": "https://bugzilla.suse.com/1210628" }, { "category": "self", "summary": "SUSE Bug 1210631", "url": "https://bugzilla.suse.com/1210631" }, { "category": "self", "summary": "SUSE Bug 1210632", "url": "https://bugzilla.suse.com/1210632" }, { "category": "self", "summary": "SUSE Bug 1210634", "url": "https://bugzilla.suse.com/1210634" }, { "category": "self", "summary": "SUSE Bug 1210635", "url": "https://bugzilla.suse.com/1210635" }, { "category": "self", "summary": "SUSE Bug 1210636", "url": "https://bugzilla.suse.com/1210636" }, { "category": "self", "summary": "SUSE Bug 1210637", "url": "https://bugzilla.suse.com/1210637" }, { "category": "self", "summary": "SUSE Bug 1211615", "url": "https://bugzilla.suse.com/1211615" }, { "category": "self", "summary": "SUSE Bug 1213470", "url": "https://bugzilla.suse.com/1213470" }, { "category": "self", "summary": "SUSE Bug 1213473", "url": "https://bugzilla.suse.com/1213473" }, { "category": "self", "summary": "SUSE Bug 1213474", "url": "https://bugzilla.suse.com/1213474" }, { "category": "self", "summary": "SUSE Bug 1213475", "url": "https://bugzilla.suse.com/1213475" }, { "category": "self", "summary": "SUSE Bug 1213481", "url": "https://bugzilla.suse.com/1213481" }, { "category": "self", "summary": "SUSE Bug 1213482", "url": "https://bugzilla.suse.com/1213482" }, { "category": "self", "summary": "SUSE Bug 1216374", "url": "https://bugzilla.suse.com/1216374" }, { "category": "self", "summary": "SUSE Bug 1217214", "url": "https://bugzilla.suse.com/1217214" }, { "category": "self", "summary": "SUSE Bug 1218903", "url": "https://bugzilla.suse.com/1218903" }, { "category": "self", "summary": "SUSE Bug 1218905", "url": "https://bugzilla.suse.com/1218905" }, { "category": "self", "summary": "SUSE Bug 1218906", "url": "https://bugzilla.suse.com/1218906" }, { "category": "self", "summary": "SUSE Bug 1218907", "url": "https://bugzilla.suse.com/1218907" }, { "category": "self", "summary": "SUSE Bug 1218909", "url": "https://bugzilla.suse.com/1218909" }, { "category": "self", "summary": "SUSE Bug 1218911", "url": "https://bugzilla.suse.com/1218911" }, { "category": "self", "summary": "SUSE Bug 1222979", "url": "https://bugzilla.suse.com/1222979" }, { "category": "self", "summary": "SUSE Bug 1222983", "url": "https://bugzilla.suse.com/1222983" }, { "category": "self", "summary": "SUSE Bug 1222984", "url": "https://bugzilla.suse.com/1222984" }, { "category": "self", "summary": "SUSE Bug 1222986", "url": "https://bugzilla.suse.com/1222986" }, { "category": "self", "summary": "SUSE Bug 1222987", "url": "https://bugzilla.suse.com/1222987" }, { "category": "self", "summary": "SUSE Bug 1225470", "url": "https://bugzilla.suse.com/1225470" }, { "category": "self", "summary": "SUSE Bug 1228046", "url": "https://bugzilla.suse.com/1228046" }, { "category": "self", "summary": "SUSE Bug 1228047", "url": "https://bugzilla.suse.com/1228047" }, { "category": "self", "summary": "SUSE Bug 1228048", "url": "https://bugzilla.suse.com/1228048" }, { "category": "self", "summary": "SUSE Bug 1228050", "url": "https://bugzilla.suse.com/1228050" }, { "category": "self", "summary": "SUSE Bug 1228051", "url": "https://bugzilla.suse.com/1228051" }, { "category": "self", "summary": "SUSE Bug 1228052", "url": "https://bugzilla.suse.com/1228052" }, { "category": "self", "summary": "SUSE Bug 1231702", "url": "https://bugzilla.suse.com/1231702" }, { "category": "self", "summary": "SUSE Bug 1231711", "url": "https://bugzilla.suse.com/1231711" }, { "category": "self", "summary": "SUSE Bug 1231716", "url": "https://bugzilla.suse.com/1231716" }, { "category": "self", "summary": "SUSE Bug 1231719", "url": "https://bugzilla.suse.com/1231719" }, { "category": "self", "summary": "SUSE Bug 1236278", "url": "https://bugzilla.suse.com/1236278" }, { "category": "self", "summary": "SUSE Bug 1236804", "url": "https://bugzilla.suse.com/1236804" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41041 page", "url": "https://www.suse.com/security/cve/CVE-2021-41041/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21426 page", "url": "https://www.suse.com/security/cve/CVE-2022-21426/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21434 page", "url": "https://www.suse.com/security/cve/CVE-2022-21434/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21443 page", "url": "https://www.suse.com/security/cve/CVE-2022-21443/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21476 page", "url": "https://www.suse.com/security/cve/CVE-2022-21476/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21496 page", "url": "https://www.suse.com/security/cve/CVE-2022-21496/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21618 page", "url": "https://www.suse.com/security/cve/CVE-2022-21618/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21619 page", "url": "https://www.suse.com/security/cve/CVE-2022-21619/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21624 page", "url": "https://www.suse.com/security/cve/CVE-2022-21624/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21626 page", "url": "https://www.suse.com/security/cve/CVE-2022-21626/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21628 page", "url": "https://www.suse.com/security/cve/CVE-2022-21628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3676 page", "url": "https://www.suse.com/security/cve/CVE-2022-3676/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39399 page", "url": "https://www.suse.com/security/cve/CVE-2022-39399/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21835 page", "url": "https://www.suse.com/security/cve/CVE-2023-21835/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21843 page", "url": "https://www.suse.com/security/cve/CVE-2023-21843/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21930 page", "url": "https://www.suse.com/security/cve/CVE-2023-21930/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21937 page", "url": "https://www.suse.com/security/cve/CVE-2023-21937/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21938 page", "url": "https://www.suse.com/security/cve/CVE-2023-21938/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21939 page", "url": "https://www.suse.com/security/cve/CVE-2023-21939/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21954 page", "url": "https://www.suse.com/security/cve/CVE-2023-21954/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21967 page", "url": "https://www.suse.com/security/cve/CVE-2023-21967/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-21968 page", "url": "https://www.suse.com/security/cve/CVE-2023-21968/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-22006 page", "url": "https://www.suse.com/security/cve/CVE-2023-22006/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-22036 page", "url": "https://www.suse.com/security/cve/CVE-2023-22036/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-22041 page", "url": "https://www.suse.com/security/cve/CVE-2023-22041/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-22045 page", "url": "https://www.suse.com/security/cve/CVE-2023-22045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-22049 page", "url": "https://www.suse.com/security/cve/CVE-2023-22049/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-22081 page", "url": "https://www.suse.com/security/cve/CVE-2023-22081/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-25193 page", "url": "https://www.suse.com/security/cve/CVE-2023-25193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2597 page", "url": "https://www.suse.com/security/cve/CVE-2023-2597/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5676 page", "url": "https://www.suse.com/security/cve/CVE-2023-5676/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-20918 page", "url": "https://www.suse.com/security/cve/CVE-2024-20918/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-20919 page", "url": "https://www.suse.com/security/cve/CVE-2024-20919/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-20921 page", "url": "https://www.suse.com/security/cve/CVE-2024-20921/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-20926 page", "url": "https://www.suse.com/security/cve/CVE-2024-20926/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-20945 page", "url": "https://www.suse.com/security/cve/CVE-2024-20945/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-20952 page", "url": "https://www.suse.com/security/cve/CVE-2024-20952/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21011 page", "url": "https://www.suse.com/security/cve/CVE-2024-21011/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21012 page", "url": "https://www.suse.com/security/cve/CVE-2024-21012/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21068 page", "url": "https://www.suse.com/security/cve/CVE-2024-21068/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21085 page", "url": "https://www.suse.com/security/cve/CVE-2024-21085/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21094 page", "url": "https://www.suse.com/security/cve/CVE-2024-21094/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21131 page", "url": "https://www.suse.com/security/cve/CVE-2024-21131/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21138 page", "url": "https://www.suse.com/security/cve/CVE-2024-21138/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21140 page", "url": "https://www.suse.com/security/cve/CVE-2024-21140/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21144 page", "url": "https://www.suse.com/security/cve/CVE-2024-21144/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21145 page", "url": "https://www.suse.com/security/cve/CVE-2024-21145/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21147 page", "url": "https://www.suse.com/security/cve/CVE-2024-21147/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21208 page", "url": "https://www.suse.com/security/cve/CVE-2024-21208/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21210 page", "url": "https://www.suse.com/security/cve/CVE-2024-21210/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21217 page", "url": "https://www.suse.com/security/cve/CVE-2024-21217/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-21235 page", "url": "https://www.suse.com/security/cve/CVE-2024-21235/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-3933 page", "url": "https://www.suse.com/security/cve/CVE-2024-3933/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21502 page", "url": "https://www.suse.com/security/cve/CVE-2025-21502/" } ], "title": "Security update for java-11-openj9", "tracking": { "current_release_date": "2025-02-18T16:58:15Z", "generator": { "date": "2025-02-18T16:58:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:0066-1", "initial_release_date": "2025-02-18T16:58:15Z", "revision_history": [ { "date": "2025-02-18T16:58:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "product": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "product_id": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "product": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "product_id": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "product": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "product_id": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "product": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "product_id": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "product": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "product_id": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "product": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "product_id": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "product": { "name": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "product_id": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "product": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "product_id": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "product": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "product_id": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "product": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "product_id": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "product": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "product_id": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "product": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "product_id": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "product": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "product_id": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "product": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "product_id": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "product": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "product_id": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "product": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "product_id": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "product": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "product_id": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "product": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "product_id": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "product": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "product_id": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "product": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "product_id": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "product": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "product_id": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "product": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "product_id": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "product": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "product_id": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "product": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "product_id": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "product": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "product_id": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP6", "product": { "name": "SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6" } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch" }, "product_reference": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch" }, "product_reference": "java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" }, "product_reference": "java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2021-41041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41041" } ], "notes": [ { "category": "general", "text": "In Eclipse Openj9 before version 0.32.0, Java 8 \u0026 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41041", "url": "https://www.suse.com/security/cve/CVE-2021-41041" }, { "category": "external", "summary": "SUSE Bug 1198935 for CVE-2021-41041", "url": "https://bugzilla.suse.com/1198935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2021-41041" }, { "cve": "CVE-2022-21426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21426", "url": "https://www.suse.com/security/cve/CVE-2022-21426" }, { "category": "external", "summary": "SUSE Bug 1198672 for CVE-2022-21426", "url": "https://bugzilla.suse.com/1198672" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21426", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21434" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21434", "url": "https://www.suse.com/security/cve/CVE-2022-21434" }, { "category": "external", "summary": "SUSE Bug 1198674 for CVE-2022-21434", "url": "https://bugzilla.suse.com/1198674" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21434", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21443" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21443", "url": "https://www.suse.com/security/cve/CVE-2022-21443" }, { "category": "external", "summary": "SUSE Bug 1198675 for CVE-2022-21443", "url": "https://bugzilla.suse.com/1198675" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21443", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21476" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21476", "url": "https://www.suse.com/security/cve/CVE-2022-21476" }, { "category": "external", "summary": "SUSE Bug 1198671 for CVE-2022-21476", "url": "https://bugzilla.suse.com/1198671" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21476", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21496" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21496", "url": "https://www.suse.com/security/cve/CVE-2022-21496" }, { "category": "external", "summary": "SUSE Bug 1198673 for CVE-2022-21496", "url": "https://bugzilla.suse.com/1198673" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21496", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21618" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21618", "url": "https://www.suse.com/security/cve/CVE-2022-21618" }, { "category": "external", "summary": "SUSE Bug 1204468 for CVE-2022-21618", "url": "https://bugzilla.suse.com/1204468" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21618", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21619" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21619", "url": "https://www.suse.com/security/cve/CVE-2022-21619" }, { "category": "external", "summary": "SUSE Bug 1204473 for CVE-2022-21619", "url": "https://bugzilla.suse.com/1204473" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21619", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21624" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21624", "url": "https://www.suse.com/security/cve/CVE-2022-21624" }, { "category": "external", "summary": "SUSE Bug 1204475 for CVE-2022-21624", "url": "https://bugzilla.suse.com/1204475" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21624", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21626" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21626", "url": "https://www.suse.com/security/cve/CVE-2022-21626" }, { "category": "external", "summary": "SUSE Bug 1204471 for CVE-2022-21626", "url": "https://bugzilla.suse.com/1204471" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21626", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21628" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21628", "url": "https://www.suse.com/security/cve/CVE-2022-21628" }, { "category": "external", "summary": "SUSE Bug 1204472 for CVE-2022-21628", "url": "https://bugzilla.suse.com/1204472" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21628", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-21628" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3676", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3676" } ], "notes": [ { "category": "general", "text": "In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3676", "url": "https://www.suse.com/security/cve/CVE-2022-3676" }, { "category": "external", "summary": "SUSE Bug 1204703 for CVE-2022-3676", "url": "https://bugzilla.suse.com/1204703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2022-3676" }, { "cve": "CVE-2022-39399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39399" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39399", "url": "https://www.suse.com/security/cve/CVE-2022-39399" }, { "category": "external", "summary": "SUSE Bug 1204480 for CVE-2022-39399", "url": "https://bugzilla.suse.com/1204480" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-39399", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2022-39399" }, { "cve": "CVE-2023-21835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21835" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21835", "url": "https://www.suse.com/security/cve/CVE-2023-21835" }, { "category": "external", "summary": "SUSE Bug 1207246 for CVE-2023-21835", "url": "https://bugzilla.suse.com/1207246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21843" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21843", "url": "https://www.suse.com/security/cve/CVE-2023-21843" }, { "category": "external", "summary": "SUSE Bug 1207248 for CVE-2023-21843", "url": "https://bugzilla.suse.com/1207248" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21930" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21930", "url": "https://www.suse.com/security/cve/CVE-2023-21930" }, { "category": "external", "summary": "SUSE Bug 1210628 for CVE-2023-21930", "url": "https://bugzilla.suse.com/1210628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21937" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21937", "url": "https://www.suse.com/security/cve/CVE-2023-21937" }, { "category": "external", "summary": "SUSE Bug 1210631 for CVE-2023-21937", "url": "https://bugzilla.suse.com/1210631" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21938" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21938", "url": "https://www.suse.com/security/cve/CVE-2023-21938" }, { "category": "external", "summary": "SUSE Bug 1210632 for CVE-2023-21938", "url": "https://bugzilla.suse.com/1210632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21939" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21939", "url": "https://www.suse.com/security/cve/CVE-2023-21939" }, { "category": "external", "summary": "SUSE Bug 1210634 for CVE-2023-21939", "url": "https://bugzilla.suse.com/1210634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-21939" }, { "cve": "CVE-2023-21954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21954" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21954", "url": "https://www.suse.com/security/cve/CVE-2023-21954" }, { "category": "external", "summary": "SUSE Bug 1210635 for CVE-2023-21954", "url": "https://bugzilla.suse.com/1210635" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21967" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21967", "url": "https://www.suse.com/security/cve/CVE-2023-21967" }, { "category": "external", "summary": "SUSE Bug 1210636 for CVE-2023-21967", "url": "https://bugzilla.suse.com/1210636" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-21968" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-21968", "url": "https://www.suse.com/security/cve/CVE-2023-21968" }, { "category": "external", "summary": "SUSE Bug 1210637 for CVE-2023-21968", "url": "https://bugzilla.suse.com/1210637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22006", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-22006" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-22006", "url": "https://www.suse.com/security/cve/CVE-2023-22006" }, { "category": "external", "summary": "SUSE Bug 1213473 for CVE-2023-22006", "url": "https://bugzilla.suse.com/1213473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-22006" }, { "cve": "CVE-2023-22036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-22036" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-22036", "url": "https://www.suse.com/security/cve/CVE-2023-22036" }, { "category": "external", "summary": "SUSE Bug 1213474 for CVE-2023-22036", "url": "https://bugzilla.suse.com/1213474" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-22036" }, { "cve": "CVE-2023-22041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-22041" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-22041", "url": "https://www.suse.com/security/cve/CVE-2023-22041" }, { "category": "external", "summary": "SUSE Bug 1213475 for CVE-2023-22041", "url": "https://bugzilla.suse.com/1213475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-22041" }, { "cve": "CVE-2023-22045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-22045" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-22045", "url": "https://www.suse.com/security/cve/CVE-2023-22045" }, { "category": "external", "summary": "SUSE Bug 1213481 for CVE-2023-22045", "url": "https://bugzilla.suse.com/1213481" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-22045" }, { "cve": "CVE-2023-22049", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-22049" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-22049", "url": "https://www.suse.com/security/cve/CVE-2023-22049" }, { "category": "external", "summary": "SUSE Bug 1213482 for CVE-2023-22049", "url": "https://bugzilla.suse.com/1213482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2023-22049" }, { "cve": "CVE-2023-22081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-22081" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-22081", "url": "https://www.suse.com/security/cve/CVE-2023-22081" }, { "category": "external", "summary": "SUSE Bug 1216374 for CVE-2023-22081", "url": "https://bugzilla.suse.com/1216374" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-22081" }, { "cve": "CVE-2023-25193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-25193" } ], "notes": [ { "category": "general", "text": "hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-25193", "url": "https://www.suse.com/security/cve/CVE-2023-25193" }, { "category": "external", "summary": "SUSE Bug 1207922 for CVE-2023-25193", "url": "https://bugzilla.suse.com/1207922" }, { "category": "external", "summary": "SUSE Bug 1213939 for CVE-2023-25193", "url": "https://bugzilla.suse.com/1213939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2023-25193" }, { "cve": "CVE-2023-2597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2597" } ], "notes": [ { "category": "general", "text": "In Eclipse Openj9 before version 0.38.0, in the implementation of the shared cache (which is enabled by default in OpenJ9 builds) the size of a string is not properly checked against the size of the buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2597", "url": "https://www.suse.com/security/cve/CVE-2023-2597" }, { "category": "external", "summary": "SUSE Bug 1211615 for CVE-2023-2597", "url": "https://bugzilla.suse.com/1211615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2023-2597" }, { "cve": "CVE-2023-5676", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5676" } ], "notes": [ { "category": "general", "text": "In Eclipse OpenJ9 before version 0.41.0, the JVM can be forced into an infinite busy hang on a spinlock or a segmentation fault if a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5676", "url": "https://www.suse.com/security/cve/CVE-2023-5676" }, { "category": "external", "summary": "SUSE Bug 1217214 for CVE-2023-5676", "url": "https://bugzilla.suse.com/1217214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2023-5676" }, { "cve": "CVE-2024-20918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-20918" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-20918", "url": "https://www.suse.com/security/cve/CVE-2024-20918" }, { "category": "external", "summary": "SUSE Bug 1218907 for CVE-2024-20918", "url": "https://bugzilla.suse.com/1218907" }, { "category": "external", "summary": "SUSE Bug 1219843 for CVE-2024-20918", "url": "https://bugzilla.suse.com/1219843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2024-20918" }, { "cve": "CVE-2024-20919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-20919" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-20919", "url": "https://www.suse.com/security/cve/CVE-2024-20919" }, { "category": "external", "summary": "SUSE Bug 1218903 for CVE-2024-20919", "url": "https://bugzilla.suse.com/1218903" }, { "category": "external", "summary": "SUSE Bug 1219843 for CVE-2024-20919", "url": "https://bugzilla.suse.com/1219843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-20919" }, { "cve": "CVE-2024-20921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-20921" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-20921", "url": "https://www.suse.com/security/cve/CVE-2024-20921" }, { "category": "external", "summary": "SUSE Bug 1218905 for CVE-2024-20921", "url": "https://bugzilla.suse.com/1218905" }, { "category": "external", "summary": "SUSE Bug 1219843 for CVE-2024-20921", "url": "https://bugzilla.suse.com/1219843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-20921" }, { "cve": "CVE-2024-20926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-20926" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-20926", "url": "https://www.suse.com/security/cve/CVE-2024-20926" }, { "category": "external", "summary": "SUSE Bug 1218906 for CVE-2024-20926", "url": "https://bugzilla.suse.com/1218906" }, { "category": "external", "summary": "SUSE Bug 1219843 for CVE-2024-20926", "url": "https://bugzilla.suse.com/1219843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-20926" }, { "cve": "CVE-2024-20945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-20945" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-20945", "url": "https://www.suse.com/security/cve/CVE-2024-20945" }, { "category": "external", "summary": "SUSE Bug 1218909 for CVE-2024-20945", "url": "https://bugzilla.suse.com/1218909" }, { "category": "external", "summary": "SUSE Bug 1219843 for CVE-2024-20945", "url": "https://bugzilla.suse.com/1219843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-20945" }, { "cve": "CVE-2024-20952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-20952" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-20952", "url": "https://www.suse.com/security/cve/CVE-2024-20952" }, { "category": "external", "summary": "SUSE Bug 1218911 for CVE-2024-20952", "url": "https://bugzilla.suse.com/1218911" }, { "category": "external", "summary": "SUSE Bug 1219843 for CVE-2024-20952", "url": "https://bugzilla.suse.com/1219843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2024-20952" }, { "cve": "CVE-2024-21011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21011" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21011", "url": "https://www.suse.com/security/cve/CVE-2024-21011" }, { "category": "external", "summary": "SUSE Bug 1222979 for CVE-2024-21011", "url": "https://bugzilla.suse.com/1222979" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21011" }, { "cve": "CVE-2024-21012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21012" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21012", "url": "https://www.suse.com/security/cve/CVE-2024-21012" }, { "category": "external", "summary": "SUSE Bug 1222987 for CVE-2024-21012", "url": "https://bugzilla.suse.com/1222987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21012" }, { "cve": "CVE-2024-21068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21068" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21068", "url": "https://www.suse.com/security/cve/CVE-2024-21068" }, { "category": "external", "summary": "SUSE Bug 1222983 for CVE-2024-21068", "url": "https://bugzilla.suse.com/1222983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21068" }, { "cve": "CVE-2024-21085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21085" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21085", "url": "https://www.suse.com/security/cve/CVE-2024-21085" }, { "category": "external", "summary": "SUSE Bug 1222984 for CVE-2024-21085", "url": "https://bugzilla.suse.com/1222984" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21085" }, { "cve": "CVE-2024-21094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21094" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21094", "url": "https://www.suse.com/security/cve/CVE-2024-21094" }, { "category": "external", "summary": "SUSE Bug 1222986 for CVE-2024-21094", "url": "https://bugzilla.suse.com/1222986" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21094" }, { "cve": "CVE-2024-21131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21131" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21131", "url": "https://www.suse.com/security/cve/CVE-2024-21131" }, { "category": "external", "summary": "SUSE Bug 1228046 for CVE-2024-21131", "url": "https://bugzilla.suse.com/1228046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21138" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21138", "url": "https://www.suse.com/security/cve/CVE-2024-21138" }, { "category": "external", "summary": "SUSE Bug 1228047 for CVE-2024-21138", "url": "https://bugzilla.suse.com/1228047" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "low" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21140" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21140", "url": "https://www.suse.com/security/cve/CVE-2024-21140" }, { "category": "external", "summary": "SUSE Bug 1228048 for CVE-2024-21140", "url": "https://bugzilla.suse.com/1228048" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21144" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21144", "url": "https://www.suse.com/security/cve/CVE-2024-21144" }, { "category": "external", "summary": "SUSE Bug 1228050 for CVE-2024-21144", "url": "https://bugzilla.suse.com/1228050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21145" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21145", "url": "https://www.suse.com/security/cve/CVE-2024-21145" }, { "category": "external", "summary": "SUSE Bug 1228051 for CVE-2024-21145", "url": "https://bugzilla.suse.com/1228051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21147" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21147", "url": "https://www.suse.com/security/cve/CVE-2024-21147" }, { "category": "external", "summary": "SUSE Bug 1228052 for CVE-2024-21147", "url": "https://bugzilla.suse.com/1228052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "important" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21208" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21208", "url": "https://www.suse.com/security/cve/CVE-2024-21208" }, { "category": "external", "summary": "SUSE Bug 1231702 for CVE-2024-21208", "url": "https://bugzilla.suse.com/1231702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21208" }, { "cve": "CVE-2024-21210", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21210" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21210", "url": "https://www.suse.com/security/cve/CVE-2024-21210" }, { "category": "external", "summary": "SUSE Bug 1231711 for CVE-2024-21210", "url": "https://bugzilla.suse.com/1231711" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21210" }, { "cve": "CVE-2024-21217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21217" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21217", "url": "https://www.suse.com/security/cve/CVE-2024-21217" }, { "category": "external", "summary": "SUSE Bug 1231716 for CVE-2024-21217", "url": "https://bugzilla.suse.com/1231716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21217" }, { "cve": "CVE-2024-21235", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-21235" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-21235", "url": "https://www.suse.com/security/cve/CVE-2024-21235" }, { "category": "external", "summary": "SUSE Bug 1231719 for CVE-2024-21235", "url": "https://bugzilla.suse.com/1231719" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-21235" }, { "cve": "CVE-2024-3933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-3933" } ], "notes": [ { "category": "general", "text": "In Eclipse OpenJ9 release versions prior to 0.44.0 and after 0.13.0, when running with JVM option -Xgc:concurrentScavenge, the sequence generated for System.arrayCopy on the IBM Z platform with hardware and software support for guarded storage [1], could allow access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. This allows read and write to addresses beyond the end of the array range.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-3933", "url": "https://www.suse.com/security/cve/CVE-2024-3933" }, { "category": "external", "summary": "SUSE Bug 1225470 for CVE-2024-3933", "url": "https://bugzilla.suse.com/1225470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2024-3933" }, { "cve": "CVE-2025-21502", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21502" } ], "notes": [ { "category": "general", "text": "unknown", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21502", "url": "https://www.suse.com/security/cve/CVE-2025-21502" }, { "category": "external", "summary": "SUSE Bug 1236278 for CVE-2025-21502", "url": "https://bugzilla.suse.com/1236278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "SUSE Package Hub 15 SP6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-demo-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-devel-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-headless-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1.noarch", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-jmods-11.0.26.0-bp156.4.3.1.x86_64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.aarch64", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.ppc64le", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.s390x", "openSUSE Leap 15.6:java-11-openj9-src-11.0.26.0-bp156.4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-18T16:58:15Z", "details": "moderate" } ], "title": "CVE-2025-21502" } ] }
opensuse-su-2025:14697-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.4-rubygem-nokogiri-1.18.2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.4-rubygem-nokogiri-1.18.2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14697", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14697-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14697-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14697-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2877 page", "url": "https://www.suse.com/security/cve/CVE-2013-2877/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0191 page", "url": "https://www.suse.com/security/cve/CVE-2014-0191/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1819 page", "url": "https://www.suse.com/security/cve/CVE-2015-1819/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5312 page", "url": "https://www.suse.com/security/cve/CVE-2015-5312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7497 page", "url": "https://www.suse.com/security/cve/CVE-2015-7497/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7498 page", "url": "https://www.suse.com/security/cve/CVE-2015-7498/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7499 page", "url": "https://www.suse.com/security/cve/CVE-2015-7499/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7500 page", "url": "https://www.suse.com/security/cve/CVE-2015-7500/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7941 page", "url": "https://www.suse.com/security/cve/CVE-2015-7941/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7942 page", "url": "https://www.suse.com/security/cve/CVE-2015-7942/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7995 page", "url": "https://www.suse.com/security/cve/CVE-2015-7995/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8035 page", "url": "https://www.suse.com/security/cve/CVE-2015-8035/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8241 page", "url": "https://www.suse.com/security/cve/CVE-2015-8241/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8242 page", "url": "https://www.suse.com/security/cve/CVE-2015-8242/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8317 page", "url": "https://www.suse.com/security/cve/CVE-2015-8317/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4658 page", "url": "https://www.suse.com/security/cve/CVE-2016-4658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4738 page", "url": "https://www.suse.com/security/cve/CVE-2016-4738/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5131 page", "url": "https://www.suse.com/security/cve/CVE-2016-5131/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15412 page", "url": "https://www.suse.com/security/cve/CVE-2017-15412/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5029 page", "url": "https://www.suse.com/security/cve/CVE-2017-5029/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14404 page", "url": "https://www.suse.com/security/cve/CVE-2018-14404/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-25032 page", "url": "https://www.suse.com/security/cve/CVE-2018-25032/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8048 page", "url": "https://www.suse.com/security/cve/CVE-2018-8048/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11068 page", "url": "https://www.suse.com/security/cve/CVE-2019-11068/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20388 page", "url": "https://www.suse.com/security/cve/CVE-2019-20388/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5477 page", "url": "https://www.suse.com/security/cve/CVE-2019-5477/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24977 page", "url": "https://www.suse.com/security/cve/CVE-2020-24977/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7595 page", "url": "https://www.suse.com/security/cve/CVE-2020-7595/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30560 page", "url": "https://www.suse.com/security/cve/CVE-2021-30560/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3516 page", "url": "https://www.suse.com/security/cve/CVE-2021-3516/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3517 page", "url": "https://www.suse.com/security/cve/CVE-2021-3517/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3518 page", "url": "https://www.suse.com/security/cve/CVE-2021-3518/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3537 page", "url": "https://www.suse.com/security/cve/CVE-2021-3537/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3541 page", "url": "https://www.suse.com/security/cve/CVE-2021-3541/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41098 page", "url": "https://www.suse.com/security/cve/CVE-2021-41098/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23308 page", "url": "https://www.suse.com/security/cve/CVE-2022-23308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23437 page", "url": "https://www.suse.com/security/cve/CVE-2022-23437/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23476 page", "url": "https://www.suse.com/security/cve/CVE-2022-23476/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24836 page", "url": "https://www.suse.com/security/cve/CVE-2022-24836/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24839 page", "url": "https://www.suse.com/security/cve/CVE-2022-24839/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29181 page", "url": "https://www.suse.com/security/cve/CVE-2022-29181/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29824 page", "url": "https://www.suse.com/security/cve/CVE-2022-29824/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-29469 page", "url": "https://www.suse.com/security/cve/CVE-2023-29469/" } ], "title": "ruby3.4-rubygem-nokogiri-1.18.2-1.1 on GA media", "tracking": { "current_release_date": "2025-01-25T00:00:00Z", "generator": { "date": "2025-01-25T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14697-1", "initial_release_date": "2025-01-25T00:00:00Z", "revision_history": [ { "date": "2025-01-25T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "product": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "product_id": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "product": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "product_id": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "product": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "product_id": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64", "product": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64", "product_id": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64" }, "product_reference": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le" }, "product_reference": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x" }, "product_reference": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" }, "product_reference": "ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2877" } ], "notes": [ { "category": "general", "text": "parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2877", "url": "https://www.suse.com/security/cve/CVE-2013-2877" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2013-2877", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 828893 for CVE-2013-2877", "url": "https://bugzilla.suse.com/828893" }, { "category": "external", "summary": "SUSE Bug 829077 for CVE-2013-2877", "url": "https://bugzilla.suse.com/829077" }, { "category": "external", "summary": "SUSE Bug 854869 for CVE-2013-2877", "url": "https://bugzilla.suse.com/854869" }, { "category": "external", "summary": "SUSE Bug 877506 for CVE-2013-2877", "url": "https://bugzilla.suse.com/877506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "critical" } ], "title": "CVE-2013-2877" }, { "cve": "CVE-2014-0191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0191" } ], "notes": [ { "category": "general", "text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0191", "url": "https://www.suse.com/security/cve/CVE-2014-0191" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2014-0191", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2014-0191", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 876652 for CVE-2014-0191", "url": "https://bugzilla.suse.com/876652" }, { "category": "external", "summary": "SUSE Bug 877506 for CVE-2014-0191", "url": "https://bugzilla.suse.com/877506" }, { "category": "external", "summary": "SUSE Bug 996079 for CVE-2014-0191", "url": "https://bugzilla.suse.com/996079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0191" }, { "cve": "CVE-2015-1819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1819" } ], "notes": [ { "category": "general", "text": "The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1819", "url": "https://www.suse.com/security/cve/CVE-2015-1819" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-1819", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 928193 for CVE-2015-1819", "url": "https://bugzilla.suse.com/928193" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-1819", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1819" }, { "cve": "CVE-2015-5312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5312" } ], "notes": [ { "category": "general", "text": "The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5312", "url": "https://www.suse.com/security/cve/CVE-2015-5312" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-5312", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957105 for CVE-2015-5312", "url": "https://bugzilla.suse.com/957105" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-5312", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-5312", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5312" }, { "cve": "CVE-2015-7497", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7497" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7497", "url": "https://www.suse.com/security/cve/CVE-2015-7497" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7497", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957106 for CVE-2015-7497", "url": "https://bugzilla.suse.com/957106" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7497", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7497", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7497" }, { "cve": "CVE-2015-7498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7498" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7498", "url": "https://www.suse.com/security/cve/CVE-2015-7498" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7498", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957107 for CVE-2015-7498", "url": "https://bugzilla.suse.com/957107" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7498", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7498", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7498" }, { "cve": "CVE-2015-7499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7499" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7499", "url": "https://www.suse.com/security/cve/CVE-2015-7499" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7499", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957109 for CVE-2015-7499", "url": "https://bugzilla.suse.com/957109" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7499", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7499", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7499" }, { "cve": "CVE-2015-7500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7500" } ], "notes": [ { "category": "general", "text": "The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7500", "url": "https://www.suse.com/security/cve/CVE-2015-7500" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7500", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 957110 for CVE-2015-7500", "url": "https://bugzilla.suse.com/957110" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-7500", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7500", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7500" }, { "cve": "CVE-2015-7941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7941" } ], "notes": [ { "category": "general", "text": "libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7941", "url": "https://www.suse.com/security/cve/CVE-2015-7941" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7941", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 951734 for CVE-2015-7941", "url": "https://bugzilla.suse.com/951734" }, { "category": "external", "summary": "SUSE Bug 951735 for CVE-2015-7941", "url": "https://bugzilla.suse.com/951735" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7941", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7941" }, { "cve": "CVE-2015-7942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7942" } ], "notes": [ { "category": "general", "text": "The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7942", "url": "https://www.suse.com/security/cve/CVE-2015-7942" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-7942", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 951735 for CVE-2015-7942", "url": "https://bugzilla.suse.com/951735" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-7942", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7942" }, { "cve": "CVE-2015-7995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7995" } ], "notes": [ { "category": "general", "text": "The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a \"type confusion\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7995", "url": "https://www.suse.com/security/cve/CVE-2015-7995" }, { "category": "external", "summary": "SUSE Bug 1123130 for CVE-2015-7995", "url": "https://bugzilla.suse.com/1123130" }, { "category": "external", "summary": "SUSE Bug 952474 for CVE-2015-7995", "url": "https://bugzilla.suse.com/952474" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7995" }, { "cve": "CVE-2015-8035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8035" } ], "notes": [ { "category": "general", "text": "The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8035", "url": "https://www.suse.com/security/cve/CVE-2015-8035" }, { "category": "external", "summary": "SUSE Bug 1088279 for CVE-2015-8035", "url": "https://bugzilla.suse.com/1088279" }, { "category": "external", "summary": "SUSE Bug 1105166 for CVE-2015-8035", "url": "https://bugzilla.suse.com/1105166" }, { "category": "external", "summary": "SUSE Bug 954429 for CVE-2015-8035", "url": "https://bugzilla.suse.com/954429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "low" } ], "title": "CVE-2015-8035" }, { "cve": "CVE-2015-8241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8241" } ], "notes": [ { "category": "general", "text": "The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8241", "url": "https://www.suse.com/security/cve/CVE-2015-8241" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-8241", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 956018 for CVE-2015-8241", "url": "https://bugzilla.suse.com/956018" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-8241", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-8241", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8241" }, { "cve": "CVE-2015-8242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8242" } ], "notes": [ { "category": "general", "text": "The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8242", "url": "https://www.suse.com/security/cve/CVE-2015-8242" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-8242", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 956021 for CVE-2015-8242", "url": "https://bugzilla.suse.com/956021" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-8242", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-8242", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8242" }, { "cve": "CVE-2015-8317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8317" } ], "notes": [ { "category": "general", "text": "The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8317", "url": "https://www.suse.com/security/cve/CVE-2015-8317" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2015-8317", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 956260 for CVE-2015-8317", "url": "https://bugzilla.suse.com/956260" }, { "category": "external", "summary": "SUSE Bug 959469 for CVE-2015-8317", "url": "https://bugzilla.suse.com/959469" }, { "category": "external", "summary": "SUSE Bug 969769 for CVE-2015-8317", "url": "https://bugzilla.suse.com/969769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8317" }, { "cve": "CVE-2016-4658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4658" } ], "notes": [ { "category": "general", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4658", "url": "https://www.suse.com/security/cve/CVE-2016-4658" }, { "category": "external", "summary": "SUSE Bug 1005544 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1005544" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1078813 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1078813" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-4738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4738" } ], "notes": [ { "category": "general", "text": "libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4738", "url": "https://www.suse.com/security/cve/CVE-2016-4738" }, { "category": "external", "summary": "SUSE Bug 1005591 for CVE-2016-4738", "url": "https://bugzilla.suse.com/1005591" }, { "category": "external", "summary": "SUSE Bug 1123130 for CVE-2016-4738", "url": "https://bugzilla.suse.com/1123130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4738" }, { "cve": "CVE-2016-5131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5131" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5131", "url": "https://www.suse.com/security/cve/CVE-2016-5131" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1078813 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1078813" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-5131", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 989901 for CVE-2016-5131", "url": "https://bugzilla.suse.com/989901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5131" }, { "cve": "CVE-2017-15412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15412" } ], "notes": [ { "category": "general", "text": "Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15412", "url": "https://www.suse.com/security/cve/CVE-2017-15412" }, { "category": "external", "summary": "SUSE Bug 1071691 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1071691" }, { "category": "external", "summary": "SUSE Bug 1077993 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1077993" }, { "category": "external", "summary": "SUSE Bug 1123129 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1123129" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2017-15412", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2017-15412" }, { "cve": "CVE-2017-5029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5029" } ], "notes": [ { "category": "general", "text": "The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5029", "url": "https://www.suse.com/security/cve/CVE-2017-5029" }, { "category": "external", "summary": "SUSE Bug 1028848 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1028848" }, { "category": "external", "summary": "SUSE Bug 1028875 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1028875" }, { "category": "external", "summary": "SUSE Bug 1035905 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1035905" }, { "category": "external", "summary": "SUSE Bug 1123130 for CVE-2017-5029", "url": "https://bugzilla.suse.com/1123130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "low" } ], "title": "CVE-2017-5029" }, { "cve": "CVE-2018-14404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14404" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14404", "url": "https://www.suse.com/security/cve/CVE-2018-14404" }, { "category": "external", "summary": "SUSE Bug 1102046 for CVE-2018-14404", "url": "https://bugzilla.suse.com/1102046" }, { "category": "external", "summary": "SUSE Bug 1148896 for CVE-2018-14404", "url": "https://bugzilla.suse.com/1148896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-14404" }, { "cve": "CVE-2018-25032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-25032" } ], "notes": [ { "category": "general", "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-25032", "url": "https://www.suse.com/security/cve/CVE-2018-25032" }, { "category": "external", "summary": "SUSE Bug 1197459 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1197459" }, { "category": "external", "summary": "SUSE Bug 1197893 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1197893" }, { "category": "external", "summary": "SUSE Bug 1198667 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1198667" }, { "category": "external", "summary": "SUSE Bug 1199104 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1199104" }, { "category": "external", "summary": "SUSE Bug 1200049 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1200049" }, { "category": "external", "summary": "SUSE Bug 1201732 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1201732" }, { "category": "external", "summary": "SUSE Bug 1202688 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1202688" }, { "category": "external", "summary": "SUSE Bug 1224427 for CVE-2018-25032", "url": "https://bugzilla.suse.com/1224427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2018-25032" }, { "cve": "CVE-2018-8048", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8048" } ], "notes": [ { "category": "general", "text": "In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8048", "url": "https://www.suse.com/security/cve/CVE-2018-8048" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-8048", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-8048", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8048" }, { "cve": "CVE-2019-11068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11068" } ], "notes": [ { "category": "general", "text": "libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11068", "url": "https://www.suse.com/security/cve/CVE-2019-11068" }, { "category": "external", "summary": "SUSE Bug 1132160 for CVE-2019-11068", "url": "https://bugzilla.suse.com/1132160" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-11068", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11068" }, { "cve": "CVE-2019-20388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20388" } ], "notes": [ { "category": "general", "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20388", "url": "https://www.suse.com/security/cve/CVE-2019-20388" }, { "category": "external", "summary": "SUSE Bug 1161521 for CVE-2019-20388", "url": "https://bugzilla.suse.com/1161521" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2019-20388", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "low" } ], "title": "CVE-2019-20388" }, { "cve": "CVE-2019-5477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5477" } ], "notes": [ { "category": "general", "text": "A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby\u0027s `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5477", "url": "https://www.suse.com/security/cve/CVE-2019-5477" }, { "category": "external", "summary": "SUSE Bug 1146578 for CVE-2019-5477", "url": "https://bugzilla.suse.com/1146578" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2019-5477" }, { "cve": "CVE-2020-24977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24977" } ], "notes": [ { "category": "general", "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24977", "url": "https://www.suse.com/security/cve/CVE-2020-24977" }, { "category": "external", "summary": "SUSE Bug 1176179 for CVE-2020-24977", "url": "https://bugzilla.suse.com/1176179" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2020-24977", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24977" }, { "cve": "CVE-2020-7595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7595" } ], "notes": [ { "category": "general", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7595", "url": "https://www.suse.com/security/cve/CVE-2020-7595" }, { "category": "external", "summary": "SUSE Bug 1161517 for CVE-2020-7595", "url": "https://bugzilla.suse.com/1161517" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2020-7595", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-7595" }, { "cve": "CVE-2021-30560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30560" } ], "notes": [ { "category": "general", "text": "Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30560", "url": "https://www.suse.com/security/cve/CVE-2021-30560" }, { "category": "external", "summary": "SUSE Bug 1188373 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1188373" }, { "category": "external", "summary": "SUSE Bug 1208574 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1208574" }, { "category": "external", "summary": "SUSE Bug 1211500 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1211500" }, { "category": "external", "summary": "SUSE Bug 1211501 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1211501" }, { "category": "external", "summary": "SUSE Bug 1211544 for CVE-2021-30560", "url": "https://bugzilla.suse.com/1211544" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3516" } ], "notes": [ { "category": "general", "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3516", "url": "https://www.suse.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "SUSE Bug 1185409 for CVE-2021-3516", "url": "https://bugzilla.suse.com/1185409" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2021-3516", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3516" }, { "cve": "CVE-2021-3517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3517" } ], "notes": [ { "category": "general", "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3517", "url": "https://www.suse.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "SUSE Bug 1185410 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1185410" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1191860" }, { "category": "external", "summary": "SUSE Bug 1194438 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1194438" }, { "category": "external", "summary": "SUSE Bug 1196383 for CVE-2021-3517", "url": "https://bugzilla.suse.com/1196383" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3517" }, { "cve": "CVE-2021-3518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3518" } ], "notes": [ { "category": "general", "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3518", "url": "https://www.suse.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "SUSE Bug 1185408 for CVE-2021-3518", "url": "https://bugzilla.suse.com/1185408" }, { "category": "external", "summary": "SUSE Bug 1191860 for CVE-2021-3518", "url": "https://bugzilla.suse.com/1191860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3537" } ], "notes": [ { "category": "general", "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3537", "url": "https://www.suse.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "SUSE Bug 1185698 for CVE-2021-3537", "url": "https://bugzilla.suse.com/1185698" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3541" } ], "notes": [ { "category": "general", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3541", "url": "https://www.suse.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "SUSE Bug 1186015 for CVE-2021-3541", "url": "https://bugzilla.suse.com/1186015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3541" }, { "cve": "CVE-2021-41098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41098" } ], "notes": [ { "category": "general", "text": "Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41098", "url": "https://www.suse.com/security/cve/CVE-2021-41098" }, { "category": "external", "summary": "SUSE Bug 1191029 for CVE-2021-41098", "url": "https://bugzilla.suse.com/1191029" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2021-41098" }, { "cve": "CVE-2022-23308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23308" } ], "notes": [ { "category": "general", "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23308", "url": "https://www.suse.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "SUSE Bug 1196490 for CVE-2022-23308", "url": "https://bugzilla.suse.com/1196490" }, { "category": "external", "summary": "SUSE Bug 1199098 for CVE-2022-23308", "url": "https://bugzilla.suse.com/1199098" }, { "category": "external", "summary": "SUSE Bug 1202688 for CVE-2022-23308", "url": "https://bugzilla.suse.com/1202688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23437" } ], "notes": [ { "category": "general", "text": "There\u0027s a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23437", "url": "https://www.suse.com/security/cve/CVE-2022-23437" }, { "category": "external", "summary": "SUSE Bug 1195108 for CVE-2022-23437", "url": "https://bugzilla.suse.com/1195108" }, { "category": "external", "summary": "SUSE Bug 1196394 for CVE-2022-23437", "url": "https://bugzilla.suse.com/1196394" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23437" }, { "cve": "CVE-2022-23476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23476" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `\u003e= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23476", "url": "https://www.suse.com/security/cve/CVE-2022-23476" }, { "category": "external", "summary": "SUSE Bug 1206227 for CVE-2022-23476", "url": "https://bugzilla.suse.com/1206227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23476" }, { "cve": "CVE-2022-24836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24836" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `\u003c v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `\u003e= 1.13.4`. There are no known workarounds for this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24836", "url": "https://www.suse.com/security/cve/CVE-2022-24836" }, { "category": "external", "summary": "SUSE Bug 1198408 for CVE-2022-24836", "url": "https://bugzilla.suse.com/1198408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-24836" }, { "cve": "CVE-2022-24839", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24839" } ], "notes": [ { "category": "general", "text": "org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `\u003e= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24839", "url": "https://www.suse.com/security/cve/CVE-2022-24839" }, { "category": "external", "summary": "SUSE Bug 1198404 for CVE-2022-24839", "url": "https://bugzilla.suse.com/1198404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-24839" }, { "cve": "CVE-2022-29181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29181" } ], "notes": [ { "category": "general", "text": "Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29181", "url": "https://www.suse.com/security/cve/CVE-2022-29181" }, { "category": "external", "summary": "SUSE Bug 1199782 for CVE-2022-29181", "url": "https://bugzilla.suse.com/1199782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-29181" }, { "cve": "CVE-2022-29824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29824" } ], "notes": [ { "category": "general", "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29824", "url": "https://www.suse.com/security/cve/CVE-2022-29824" }, { "category": "external", "summary": "SUSE Bug 1199132 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1199132" }, { "category": "external", "summary": "SUSE Bug 1202878 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1202878" }, { "category": "external", "summary": "SUSE Bug 1204121 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1204121" }, { "category": "external", "summary": "SUSE Bug 1204131 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1204131" }, { "category": "external", "summary": "SUSE Bug 1205069 for CVE-2022-29824", "url": "https://bugzilla.suse.com/1205069" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-29824" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-29469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-29469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-29469", "url": "https://www.suse.com/security/cve/CVE-2023-29469" }, { "category": "external", "summary": "SUSE Bug 1210412 for CVE-2023-29469", "url": "https://bugzilla.suse.com/1210412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-nokogiri-1.18.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-29469" } ] }
rhsa-2022:5700
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5700", "url": "https://access.redhat.com/errata/RHSA-2022:5700" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5700.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security update", "tracking": { "current_release_date": "2025-08-04T14:21:50+00:00", "generator": { "date": "2025-08-04T14:21:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5700", "initial_release_date": "2022-07-25T18:37:55+00:00", "revision_history": [ { "date": "2022-07-25T18:37:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:37:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el8_2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el8_2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:37:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5700" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:37:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5700" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:37:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5700" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024:8826
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0. Red Hat Product Security has rated\nthis update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)\n\n* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)\n\n* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)\n\n* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\n* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8826", "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "JBEAP-24945", "url": "https://issues.redhat.com/browse/JBEAP-24945" }, { "category": "external", "summary": "JBEAP-25035", "url": "https://issues.redhat.com/browse/JBEAP-25035" }, { "category": "external", "summary": "JBEAP-27002", "url": "https://issues.redhat.com/browse/JBEAP-27002" }, { "category": "external", "summary": "JBEAP-27194", "url": "https://issues.redhat.com/browse/JBEAP-27194" }, { "category": "external", "summary": "JBEAP-27276", "url": "https://issues.redhat.com/browse/JBEAP-27276" }, { "category": "external", "summary": "JBEAP-27293", "url": "https://issues.redhat.com/browse/JBEAP-27293" }, { "category": "external", "summary": "JBEAP-27392", "url": "https://issues.redhat.com/browse/JBEAP-27392" }, { "category": "external", "summary": "JBEAP-27543", "url": "https://issues.redhat.com/browse/JBEAP-27543" }, { "category": "external", "summary": "JBEAP-27585", "url": "https://issues.redhat.com/browse/JBEAP-27585" }, { "category": "external", "summary": "JBEAP-27643", "url": "https://issues.redhat.com/browse/JBEAP-27643" }, { "category": "external", "summary": "JBEAP-27659", "url": "https://issues.redhat.com/browse/JBEAP-27659" }, { "category": "external", "summary": "JBEAP-27688", "url": "https://issues.redhat.com/browse/JBEAP-27688" }, { "category": "external", "summary": "JBEAP-27694", "url": "https://issues.redhat.com/browse/JBEAP-27694" }, { "category": "external", "summary": "JBEAP-27957", "url": "https://issues.redhat.com/browse/JBEAP-27957" }, { "category": "external", "summary": "JBEAP-28057", "url": "https://issues.redhat.com/browse/JBEAP-28057" }, { "category": "external", "summary": "JBEAP-28278", "url": "https://issues.redhat.com/browse/JBEAP-28278" }, { "category": "external", "summary": "JBEAP-28289", "url": "https://issues.redhat.com/browse/JBEAP-28289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8826.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update", "tracking": { "current_release_date": "2025-08-14T16:12:10+00:00", "generator": { "date": "2025-08-14T16:12:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8826", "initial_release_date": "2024-11-04T20:56:02+00:00", "revision_history": [ { "date": "2024-11-04T20:56:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T20:56:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:12:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 8", "product": { "name": "Red Hat JBoss Enterprise Application Platform 8", "product_id": "Red Hat JBoss Enterprise Application Platform 8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-04T17:02:58.468000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2309764" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Nimbus Jose JWT package. By crafting a JWE with an excessively large p2c value, an attacker can trigger significant resource consumption during decryption, potentially leading to application slowdown or unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52428" }, { "category": "external", "summary": "RHBZ#2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428" } ], "release_date": "2024-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "acknowledgments": [ { "names": [ "Tanner Emek" ] } ], "cve": "CVE-2024-8698", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2024-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2311641" } ], "notes": [ { "category": "description", "text": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak\u0027s signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8698" }, { "category": "external", "summary": "RHBZ#2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698" } ], "release_date": "2024-09-19T15:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak" }, { "acknowledgments": [ { "names": [ "Niklas Conrad", "Karsten Meyer zu Selhausen" ] } ], "cve": "CVE-2024-8883", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-09-16T06:17:01.573000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312511" } ], "notes": [ { "category": "description", "text": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a \u0027Valid Redirect URI\u0027 is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform limits access to external systems and enforces strict network security boundaries through a deny-all, allow-exception system implementation. This ensures that access to external websites and systems is strictly controlled, monitored, and, if necessary, restricted. By enforcing policies on which external sites or domains users and applications can interact with, this control minimizes the risk of users being redirected to malicious websites. For example, organizations may implement allowlists of approved URLs or domains, blocking any redirections to untrusted or unauthorized sites. The platform\u0027s implementation of boundary protection includes firewalls, gateways, and intrusion detection/prevention systems. This control prevents unauthorized traffic, including malicious redirect requests, from entering or leaving the internal network. The boundary protection control can enforce URL filtering, domain allowlisting, and content inspection to block redirection attempts to known malicious domains. When configured properly, boundary protection mechanisms ensure that even if an open redirect vulnerability is exploited, the impact is limited by blocking access to harmful external sites.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8883" }, { "category": "external", "summary": "RHBZ#2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java" } ], "release_date": "2024-09-19T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec" }, { "cve": "CVE-2024-41172", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-07-19T09:20:34+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298829" } ], "notes": [ { "category": "description", "text": "A memory consumption flaw was found in Apache CXF. This issue may allow a CXF HTTP client conduit to prevent HTTPClient instances from being garbage collected, eventually causing the application to run out of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41172" }, { "category": "external", "summary": "RHBZ#2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg", "url": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6" }, { "category": "external", "summary": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg", "url": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg" } ], "release_date": "2024-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients" } ] }
rhsa-2022:5755
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.16) for portable Linux serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.15) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5755", "url": "https://access.redhat.com/errata/RHSA-2022:5755" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5755.json" } ], "title": "Red Hat Security Advisory: OpenJDK 11.0.16 Security Update for Portable Linux Builds", "tracking": { "current_release_date": "2025-08-04T14:21:48+00:00", "generator": { "date": "2025-08-04T14:21:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5755", "initial_release_date": "2022-07-28T15:39:57+00:00", "revision_history": [ { "date": "2022-07-28T15:39:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:39:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 11.0.16", "product": { "name": "Red Hat Build of OpenJDK 11.0.16", "product_id": "Red Hat Build of OpenJDK 11.0.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:11" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:39:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:39:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:39:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5695
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084777)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-11] (BZ#2099915)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-11] (BZ#2107866)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-11] (BZ#2107868)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5695", "url": "https://access.redhat.com/errata/RHSA-2022:5695" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084777" }, { "category": "external", "summary": "2099915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099915" }, { "category": "external", "summary": "2107866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107866" }, { "category": "external", "summary": "2107868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107868" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5695.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:41+00:00", "generator": { "date": "2025-08-04T14:21:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5695", "initial_release_date": "2022-07-25T14:56:24+00:00", "revision_history": [ { "date": "2022-07-25T14:56:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T14:56:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T14:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5695" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T14:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5695" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T14:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5695" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5685
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5685", "url": "https://access.redhat.com/errata/RHSA-2022:5685" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5685.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2025-08-04T14:20:49+00:00", "generator": { "date": "2025-08-04T14:20:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5685", "initial_release_date": "2022-07-21T14:12:37+00:00", "revision_history": [ { "date": "2022-07-21T14:12:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T14:12:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:20:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T14:12:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5685" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T14:12:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5685" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T14:12:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5685" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5701
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5701", "url": "https://access.redhat.com/errata/RHSA-2022:5701" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5701.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security update", "tracking": { "current_release_date": "2025-08-04T14:20:54+00:00", "generator": { "date": "2025-08-04T14:20:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5701", "initial_release_date": "2022-07-25T15:32:29+00:00", "revision_history": [ { "date": "2022-07-25T15:32:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T15:32:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:20:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el8_1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el8_1?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T15:32:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5701" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T15:32:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5701" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T15:32:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5701" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5681
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099918)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108249)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108252)\n\n* Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-17] (BZ#2108269)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5681", "url": "https://access.redhat.com/errata/RHSA-2022:5681" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2099918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099918" }, { "category": "external", "summary": "2108249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108249" }, { "category": "external", "summary": "2108252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108252" }, { "category": "external", "summary": "2108269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108269" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5681.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security and bug fix update", "tracking": { "current_release_date": "2025-08-04T14:21:22+00:00", "generator": { "date": "2025-08-04T14:21:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5681", "initial_release_date": "2022-07-21T15:31:09+00:00", "revision_history": [ { "date": "2022-07-21T15:31:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T15:31:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:31:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:31:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:31:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5709
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084776)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-8] (BZ#2099916)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-8] (BZ#2107956)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-8] (BZ#2107958)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5709", "url": "https://access.redhat.com/errata/RHSA-2022:5709" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084776" }, { "category": "external", "summary": "2099916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099916" }, { "category": "external", "summary": "2107956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107956" }, { "category": "external", "summary": "2107958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107958" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5709.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:03+00:00", "generator": { "date": "2025-08-04T14:21:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5709", "initial_release_date": "2022-07-25T23:19:11+00:00", "revision_history": [ { "date": "2022-07-25T23:19:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T23:19:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el9_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el9_0?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T23:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5709" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T23:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5709" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T23:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5709" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5697
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099912)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108565)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108567)\n\n* Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] (BZ#2108667)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5697", "url": "https://access.redhat.com/errata/RHSA-2022:5697" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2099912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099912" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108565" }, { "category": "external", "summary": "2108567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108567" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2108667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108667" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5697.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update", "tracking": { "current_release_date": "2025-08-04T14:22:17+00:00", "generator": { "date": "2025-08-04T14:22:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5697", "initial_release_date": "2022-07-25T18:48:12+00:00", "revision_history": [ { "date": "2022-07-25T18:48:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:48:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:22:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el8_4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el8_4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:48:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:48:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:48:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024:8076
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8076", "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27050", "url": "https://issues.redhat.com/browse/JBEAP-27050" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8076.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2025-08-14T16:11:04+00:00", "generator": { "date": "2025-08-14T16:11:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8076", "initial_release_date": "2024-10-14T18:01:49+00:00", "revision_history": [ { "date": "2024-10-14T18:01:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:01:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:11:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.4 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-2.SP1_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-39.Final_redhat_00039.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-39.Final_redhat_00039.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2024:8075
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8075", "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27049", "url": "https://issues.redhat.com/browse/JBEAP-27049" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8075.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2025-08-14T16:13:02+00:00", "generator": { "date": "2025-08-14T16:13:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8075", "initial_release_date": "2024-10-14T18:01:59+00:00", "revision_history": [ { "date": "2024-10-14T18:01:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:01:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:13:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-2.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-39.Final_redhat_00039.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-39.Final_redhat_00039.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el7eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_id": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper-debuginfo@1.1.3-1.redhat_00001.1.el7eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2024:10208
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.7, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.8 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible [eap-7.1.z] (CVE-2020-28052)\n\n* hsqldb: Untrusted input may lead to RCE attack [eap-7.1.z] (CVE-2022-41853)\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-7.1.z] (CVE-2024-28752)\n\n* h2: Loading of custom classes from remote servers through JNDI [eap-7.1.z] (CVE-2022-23221)\n\n* CXF: Apache CXF: SSRF Vulnerability [eap-7.1.z] (CVE-2022-46364)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.1.z] (CVE-2022-34169)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging [eap-7.1.z] (CVE-2023-26464)\n\n* xnio: StackOverflowException when the chain of notifier states becomes problematically big [eap-7.1.z] (CVE-2023-5685)\n\n* server: eap-7: heap exhaustion via deserialization [eap-7.1.z] (CVE-2023-3171)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling [eap-7.1.z] (CVE-2020-7238)\n\n* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK [eap-7.1.z] (CVE-2023-39410)\n\n* avro: apache-avro: Schema parsing may trigger Remote Code Execution (RCE) [eap-7.1.z] (CVE-2024-47561)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:10208", "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1912881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912881" }, { "category": "external", "summary": "2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "JBEAP-27708", "url": "https://issues.redhat.com/browse/JBEAP-27708" }, { "category": "external", "summary": "JBEAP-28086", "url": "https://issues.redhat.com/browse/JBEAP-28086" }, { "category": "external", "summary": "JBEAP-28130", "url": "https://issues.redhat.com/browse/JBEAP-28130" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10208.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.8 on RHEL 7 security update", "tracking": { "current_release_date": "2025-08-14T16:07:15+00:00", "generator": { "date": "2025-08-14T16:07:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:10208", "initial_release_date": "2024-11-25T00:12:13+00:00", "revision_history": [ { "date": "2024-11-25T00:12:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-25T00:12:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:07:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "product_id": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jackson-databind@2.8.11.6-1.SP1_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.5.10-1.Final_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "product": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "product_id": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-2.redhat_00003.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "product_id": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-26.redhat_00015.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "product_id": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "product": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "product_id": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle@1.68.0-1.redhat_00005.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "product": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "product_id": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-2.redhat_00005.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "product_id": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.8-2.GA_redhat_00002.1.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jackson-databind@2.8.11.6-1.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.5.10-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "product": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "product_id": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-2.redhat_00003.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-26.redhat_00015.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.15-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle-mail@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle-pkix@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle-prov@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-2.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.8-2.GA_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.1.8-2.GA_redhat_00002.1.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch" }, "product_reference": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src" }, "product_reference": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src" }, "product_reference": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src" }, "product_reference": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-28052", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-01-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912881" } ], "notes": [ { "category": "description", "text": "A flaw was found in bouncycastle. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28052" }, { "category": "external", "summary": "RHBZ#1912881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28052", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28052" } ], "release_date": "2020-12-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "Users unable to upgrade to version 1.67 or greater can copy the `OpenBSDBCrypt.doCheckPassword()` method implementation (https://github.com/bcgit/bc-java/blob/r1rv67/core/src/main/java/org/bouncycastle/crypto/generators/OpenBSDBCrypt.java#L259-L343) into their own utility class and supplement it with the required methods and variables as required", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible" }, { "cve": "CVE-2022-23221", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044596" } ], "notes": [ { "category": "description", "text": "A flaw was found in the H2 Console. This flaw allows remote attackers to execute arbitrary code via a JDBC URL, concatenating with a substring that allows remote code execution by using a script.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Loading of custom classes from remote servers through JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the openshift-enterprise-3.11/metrics-hawkular-metrics-container container image ships a vulnerable version of h2 as part of the underlying images, but as it uses standard configuration and Console is not enabled/started by default, therefore the impact by this vulnerability is LOW and will not be fixed as OCP 3.x has already reached End of Full Support.\n\n[1] https://access.redhat.com/support/policy/updates/openshift_noncurrent", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23221" }, { "category": "external", "summary": "RHBZ#2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-45hx-wfhj-473x", "url": "https://github.com/advisories/GHSA-45hx-wfhj-473x" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "h2: Loading of custom classes from remote servers through JNDI" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-41853", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2022-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136141" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "hsqldb: Untrusted input may lead to RCE attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41853" }, { "category": "external", "summary": "RHBZ#2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41853" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853" }, { "category": "external", "summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control", "url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682", "url": "https://github.com/advisories/GHSA-77xx-rxvh-q682" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hsqldb: Untrusted input may lead to RCE attack" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSRF Vulnerability" }, { "cve": "CVE-2023-3171", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2213639" } ], "notes": [ { "category": "description", "text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "eap-7: heap exhaustion via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3171" }, { "category": "external", "summary": "RHBZ#2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171" } ], "release_date": "2023-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eap-7: heap exhaustion via deserialization" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241822" } ], "notes": [ { "category": "description", "text": "A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "xnio: StackOverflowException when the chain of notifier states becomes problematically big", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this vulnerability as an Important impact as the uncontrolled resource consumption may lead to Denial of Service (DoS). This might be intentioned by an attacker who is looking to jeopardize an environment.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5685" }, { "category": "external", "summary": "RHBZ#2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5685", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "There is currently no mitigation available for this vulnerability. Please keep the packages up-to-date as the updates become available.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xnio: StackOverflowException when the chain of notifier states becomes problematically big" }, { "cve": "CVE-2023-26464", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2182864" } ], "notes": [ { "category": "description", "text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j1-socketappender: DoS via hashmap logging", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26464" }, { "category": "external", "summary": "RHBZ#2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464" }, { "category": "external", "summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464", "url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464" } ], "release_date": "2023-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j1-socketappender: DoS via hashmap logging" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242521" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-avro. When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints, leading to an out-of-memory error and a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39410" }, { "category": "external", "summary": "RHBZ#2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/AVRO-3819", "url": "https://issues.apache.org/jira/browse/AVRO-3819" } ], "release_date": "2023-09-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270732" } ], "notes": [ { "category": "description", "text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28752" }, { "category": "external", "summary": "RHBZ#2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
rhsa-2024:8077
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8077", "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27051", "url": "https://issues.redhat.com/browse/JBEAP-27051" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8077.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2025-08-14T16:11:15+00:00", "generator": { "date": "2025-08-14T16:11:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8077", "initial_release_date": "2024-10-14T18:01:43+00:00", "revision_history": [ { "date": "2024-10-14T18:01:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:01:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:11:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.4 for RHEL 9", "product": { "name": "Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el9eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_id": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-2.SP1_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-39.Final_redhat_00039.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-39.Final_redhat_00039.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2022:5683
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084649)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099917)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108248)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108251)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5683", "url": "https://access.redhat.com/errata/RHSA-2022:5683" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084649" }, { "category": "external", "summary": "2099917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099917" }, { "category": "external", "summary": "2108248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108248" }, { "category": "external", "summary": "2108251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108251" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5683.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:11+00:00", "generator": { "date": "2025-08-04T14:21:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5683", "initial_release_date": "2022-07-21T15:29:58+00:00", "revision_history": [ { "date": "2022-07-21T15:29:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T15:29:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:29:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:29:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:29:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5754
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (8u342) for portable Linux serves as a replacement for Red Hat build of OpenJDK 8 (8u332) and includes security and bug fixes as well as enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5754", "url": "https://access.redhat.com/errata/RHSA-2022:5754" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5754.json" } ], "title": "Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds", "tracking": { "current_release_date": "2025-08-04T14:21:31+00:00", "generator": { "date": "2025-08-04T14:21:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5754", "initial_release_date": "2022-07-28T15:33:08+00:00", "revision_history": [ { "date": "2022-07-28T15:33:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:33:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 8u342", "product": { "name": "Red Hat Build of OpenJDK 8u342", "product_id": "Red Hat Build of OpenJDK 8u342", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:1.8" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:33:08+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5754" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:33:08+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5754" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:33:08+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5754" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5736
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084779)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099919)\n\n* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2105395)\n\n* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2107941)\n\n* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2107943)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5736", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084779" }, { "category": "external", "summary": "2099919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099919" }, { "category": "external", "summary": "2105395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105395" }, { "category": "external", "summary": "2107941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107941" }, { "category": "external", "summary": "2107943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107943" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5736.json" } ], "title": "Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:22+00:00", "generator": { "date": "2025-08-04T14:21:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5736", "initial_release_date": "2022-07-27T13:22:38+00:00", "revision_history": [ { "date": "2022-07-27T13:22:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-27T13:22:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024:3708
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available.\n\nThe purpose of this text-only errata is to inform you about the security issues fixed.\n\nSecurity Fix(es):\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data (CVE-2022-45685)\n\n* santuario: Private Key disclosure in debug-log output (CVE-2023-44483)\n\n* springframework: URL Parsing with Host Validation (CVE-2024-22262)\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding (CVE-2024-28752)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3708", "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2214825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214825" }, { "category": "external", "summary": "2246070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246070" }, { "category": "external", "summary": "2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "2275257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275257" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3708.json" } ], "title": "Red Hat Security Advisory: Red Hat Build of Apache Camel 3.20.6 for Spring Boot security update.", "tracking": { "current_release_date": "2025-08-14T16:10:53+00:00", "generator": { "date": "2025-08-14T16:10:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:3708", "initial_release_date": "2024-06-06T16:42:04+00:00", "revision_history": [ { "date": "2024-06-06T16:42:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-06-06T16:42:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:10:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat build of Apache Camel 3.20.6 for Spring Boot", "product": { "name": "Red Hat build of Apache Camel 3.20.6 for Spring Boot", "product_id": "Red Hat build of Apache Camel 3.20.6 for Spring Boot", "product_identification_helper": { "cpe": "cpe:/a:redhat:apache_camel_spring_boot:3.20.6" } } } ], "category": "product_family", "name": "Red Hat Build of Apache Camel" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-45685", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-06-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2214825" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison. Sending a specially crafted string can cause a stack-based buffer overflow. This issue may allow a remote attacker to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate. A successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45685" }, { "category": "external", "summary": "RHBZ#2214825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45685" } ], "release_date": "2022-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data" }, { "cve": "CVE-2023-44483", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2023-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2246070" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled.\u00a0Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "santuario: Private Key disclosure in debug-log output", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-44483" }, { "category": "external", "summary": "RHBZ#2246070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44483" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2023/10/20/5", "url": "http://www.openwall.com/lists/oss-security/2023/10/20/5" }, { "category": "external", "summary": "https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55", "url": "https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55" } ], "release_date": "2023-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "santuario: Private Key disclosure in debug-log output" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270158" } ], "notes": [ { "category": "description", "text": "A broken access control flaw was found in Spring Security. Applications may be vulnerable when directly using the AuthenticatedVoter#vote passing a NULL authentication parameter.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security: Broken Access Control With Direct Use of AuthenticatedVoter", "title": "Vulnerability summary" }, { "category": "other", "text": "The AuthenticatedVoter class was deprecated since Spring Security 5.8 is used in favor of the AuthorizationManager class, which is not vulnerable to this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22257" }, { "category": "external", "summary": "RHBZ#2270158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22257", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257" }, { "category": "external", "summary": "https://spring.io/security/cve-2024-22257", "url": "https://spring.io/security/cve-2024-22257" } ], "release_date": "2024-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "spring-security: Broken Access Control With Direct Use of AuthenticatedVoter" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2275257" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Spring Framework. Applications that use UriComponentsBuilder to parse an externally provided URL, for example, through a query parameter, and perform validation checks on the host of the parsed URL may be vulnerable to an open redirect attack or an SSRF attack if the URL is used after passing validation checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: URL Parsing with Host Validation", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse 7 does not use the affected function, but the function is still available for user convenience which demands one to validate the input.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22262" }, { "category": "external", "summary": "RHBZ#2275257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275257" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22262" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "https://spring.io/security/cve-2024-22262", "url": "https://spring.io/security/cve-2024-22262" } ], "release_date": "2024-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "springframework: URL Parsing with Host Validation" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270732" } ], "notes": [ { "category": "description", "text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28752" }, { "category": "external", "summary": "RHBZ#2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding" } ] }
rhsa-2022:5684
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5684", "url": "https://access.redhat.com/errata/RHSA-2022:5684" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5684.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2025-08-04T14:20:58+00:00", "generator": { "date": "2025-08-04T14:20:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5684", "initial_release_date": "2022-07-21T15:04:16+00:00", "revision_history": [ { "date": "2022-07-21T15:04:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T15:04:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:20:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5684" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5684" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5684" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084650)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099913)\n\n* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2108190)\n\n* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2108206)\n\n* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2108209)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5726", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084650" }, { "category": "external", "summary": "2099913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099913" }, { "category": "external", "summary": "2108190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108190" }, { "category": "external", "summary": "2108206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108206" }, { "category": "external", "summary": "2108209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108209" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2109106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109106" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5726.json" } ], "title": "Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:12+00:00", "generator": { "date": "2025-08-04T14:21:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5726", "initial_release_date": "2022-07-26T18:26:45+00:00", "revision_history": [ { "date": "2022-07-26T18:26:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-26T18:26:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5698
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5698", "url": "https://access.redhat.com/errata/RHSA-2022:5698" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2083257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083257" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5698.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:59+00:00", "generator": { "date": "2025-08-04T14:21:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5698", "initial_release_date": "2022-07-25T18:53:32+00:00", "revision_history": [ { "date": "2022-07-25T18:53:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:53:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el7_9?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el7_9?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:53:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5698" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:53:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5698" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:53:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5698" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5696
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084648)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099911)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108564)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108566)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5696", "url": "https://access.redhat.com/errata/RHSA-2022:5696" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084648" }, { "category": "external", "summary": "2099911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099911" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2108564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108564" }, { "category": "external", "summary": "2108566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108566" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5696.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:22:09+00:00", "generator": { "date": "2025-08-04T14:22:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5696", "initial_release_date": "2022-07-25T18:49:13+00:00", "revision_history": [ { "date": "2022-07-25T18:49:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:49:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:22:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-2.el8_6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-2.el8_6?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:49:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:49:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:49:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024:8824
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)\n\n* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)\n\n* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)\n\n* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\n* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8824", "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "JBEAP-24945", "url": "https://issues.redhat.com/browse/JBEAP-24945" }, { "category": "external", "summary": "JBEAP-25035", "url": "https://issues.redhat.com/browse/JBEAP-25035" }, { "category": "external", "summary": "JBEAP-27002", "url": "https://issues.redhat.com/browse/JBEAP-27002" }, { "category": "external", "summary": "JBEAP-27194", "url": "https://issues.redhat.com/browse/JBEAP-27194" }, { "category": "external", "summary": "JBEAP-27248", "url": "https://issues.redhat.com/browse/JBEAP-27248" }, { "category": "external", "summary": "JBEAP-27276", "url": "https://issues.redhat.com/browse/JBEAP-27276" }, { "category": "external", "summary": "JBEAP-27293", "url": "https://issues.redhat.com/browse/JBEAP-27293" }, { "category": "external", "summary": "JBEAP-27392", "url": "https://issues.redhat.com/browse/JBEAP-27392" }, { "category": "external", "summary": "JBEAP-27543", "url": "https://issues.redhat.com/browse/JBEAP-27543" }, { "category": "external", "summary": "JBEAP-27585", "url": "https://issues.redhat.com/browse/JBEAP-27585" }, { "category": "external", "summary": "JBEAP-27643", "url": "https://issues.redhat.com/browse/JBEAP-27643" }, { "category": "external", "summary": "JBEAP-27659", "url": "https://issues.redhat.com/browse/JBEAP-27659" }, { "category": "external", "summary": "JBEAP-27688", "url": "https://issues.redhat.com/browse/JBEAP-27688" }, { "category": "external", "summary": "JBEAP-27694", "url": "https://issues.redhat.com/browse/JBEAP-27694" }, { "category": "external", "summary": "JBEAP-27957", "url": "https://issues.redhat.com/browse/JBEAP-27957" }, { "category": "external", "summary": "JBEAP-28057", "url": "https://issues.redhat.com/browse/JBEAP-28057" }, { "category": "external", "summary": "JBEAP-28278", "url": "https://issues.redhat.com/browse/JBEAP-28278" }, { "category": "external", "summary": "JBEAP-28289", "url": "https://issues.redhat.com/browse/JBEAP-28289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8824.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update", "tracking": { "current_release_date": "2025-08-14T16:11:40+00:00", "generator": { "date": "2025-08-14T16:11:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8824", "initial_release_date": "2024-11-04T20:13:24+00:00", "revision_history": [ { "date": "2024-11-04T20:13:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T20:13:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:11:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 8.0 for RHEL 9", "product": { "name": "Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el9eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_id": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-core@6.2.31-1.Final_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_id": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-envers@6.2.31-1.Final_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm-util@9.6.0-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools-core@4.0.2-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-rt@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-services@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-tools@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-cli@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-commons@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-core-client@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-dto@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hornetq-protocol@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hqclient-protocol@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-client@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-ra@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-server@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-service-extensions@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jdbc-store@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-journal@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-selector@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-server@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_id": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack@800.4.0-1.GA_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl@3.0.1-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbosstxbridge@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbossxts@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-idlj@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-integration@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-api@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-bridge@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-integration@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-util@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j-api@2.0.16-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-core@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-kms@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-s3@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jmespath-java@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-tracing-api@2.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator-cdi@8.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk11@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk17@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk21@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-modules@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_id": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native-wildfly@2.0.0-2.redhat_00005.1.el9eap?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64" }, "product_reference": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-04T17:02:58.468000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2309764" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Nimbus Jose JWT package. By crafting a JWE with an excessively large p2c value, an attacker can trigger significant resource consumption during decryption, potentially leading to application slowdown or unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52428" }, { "category": "external", "summary": "RHBZ#2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428" } ], "release_date": "2024-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "acknowledgments": [ { "names": [ "Tanner Emek" ] } ], "cve": "CVE-2024-8698", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2024-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2311641" } ], "notes": [ { "category": "description", "text": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak\u0027s signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8698" }, { "category": "external", "summary": "RHBZ#2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698" } ], "release_date": "2024-09-19T15:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak" }, { "acknowledgments": [ { "names": [ "Niklas Conrad", "Karsten Meyer zu Selhausen" ] } ], "cve": "CVE-2024-8883", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-09-16T06:17:01.573000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312511" } ], "notes": [ { "category": "description", "text": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a \u0027Valid Redirect URI\u0027 is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform limits access to external systems and enforces strict network security boundaries through a deny-all, allow-exception system implementation. This ensures that access to external websites and systems is strictly controlled, monitored, and, if necessary, restricted. By enforcing policies on which external sites or domains users and applications can interact with, this control minimizes the risk of users being redirected to malicious websites. For example, organizations may implement allowlists of approved URLs or domains, blocking any redirections to untrusted or unauthorized sites. The platform\u0027s implementation of boundary protection includes firewalls, gateways, and intrusion detection/prevention systems. This control prevents unauthorized traffic, including malicious redirect requests, from entering or leaving the internal network. The boundary protection control can enforce URL filtering, domain allowlisting, and content inspection to block redirection attempts to known malicious domains. When configured properly, boundary protection mechanisms ensure that even if an open redirect vulnerability is exploited, the impact is limited by blocking access to harmful external sites.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8883" }, { "category": "external", "summary": "RHBZ#2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java" } ], "release_date": "2024-09-19T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec" }, { "cve": "CVE-2024-41172", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-07-19T09:20:34+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298829" } ], "notes": [ { "category": "description", "text": "A memory consumption flaw was found in Apache CXF. This issue may allow a CXF HTTP client conduit to prevent HTTPClient instances from being garbage collected, eventually causing the application to run out of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41172" }, { "category": "external", "summary": "RHBZ#2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg", "url": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6" }, { "category": "external", "summary": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg", "url": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg" } ], "release_date": "2024-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients" } ] }
rhsa-2022:5756
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.16) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.15) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5756", "url": "https://access.redhat.com/errata/RHSA-2022:5756" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5756.json" } ], "title": "Red Hat Security Advisory: OpenJDK 11.0.16 security update for Windows Builds", "tracking": { "current_release_date": "2025-08-04T14:22:13+00:00", "generator": { "date": "2025-08-04T14:22:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5756", "initial_release_date": "2022-07-28T15:40:42+00:00", "revision_history": [ { "date": "2022-07-28T15:40:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:40:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:22:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 11.0.16", "product": { "name": "Red Hat Build of OpenJDK 11.0.16", "product_id": "Red Hat Build of OpenJDK 11.0.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:11::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:40:42+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5756" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:40:42+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5756" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:40:42+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5756" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5687
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5687", "url": "https://access.redhat.com/errata/RHSA-2022:5687" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2083258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083258" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5687.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T14:21:31+00:00", "generator": { "date": "2025-08-04T14:21:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5687", "initial_release_date": "2022-07-21T16:56:38+00:00", "revision_history": [ { "date": "2022-07-21T16:56:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T16:56:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T16:56:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5687" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T16:56:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5687" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T16:56:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5687" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024:8080
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8080", "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8080.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2025-08-14T16:11:28+00:00", "generator": { "date": "2025-08-14T16:11:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8080", "initial_release_date": "2024-10-14T18:07:02+00:00", "revision_history": [ { "date": "2024-10-14T18:07:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:07:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:11:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7", "product_id": "Red Hat JBoss Enterprise Application Platform 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2022:5758
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 17 (17.0.4) for portable Linux\nserves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and\nincludes security and bug fixes, and enhancements. For further information,\nrefer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5758", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5758.json" } ], "title": "Red Hat Security Advisory: OpenJDK 17.0.4 Security Update for Portable Linux Builds", "tracking": { "current_release_date": "2025-08-04T14:22:04+00:00", "generator": { "date": "2025-08-04T14:22:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5758", "initial_release_date": "2022-07-28T15:46:45+00:00", "revision_history": [ { "date": "2022-07-28T15:46:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:46:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:22:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 17.0.4", "product": { "name": "Red Hat Build of OpenJDK 17.0.4", "product_id": "Red Hat Build of OpenJDK 17.0.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:17" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022:5757
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 17 (17.0.4) for Windows\nserves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and\nincludes security and bug fixes, and enhancements. For further information,\nrefer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5757", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5757.json" } ], "title": "Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds", "tracking": { "current_release_date": "2025-08-04T14:21:56+00:00", "generator": { "date": "2025-08-04T14:21:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5757", "initial_release_date": "2022-07-28T15:45:58+00:00", "revision_history": [ { "date": "2022-07-28T15:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 17.0.4", "product": { "name": "Red Hat Build of OpenJDK 17.0.4", "product_id": "Red Hat Build of OpenJDK 17.0.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:17::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024:10207
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.11 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.10, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.11 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-7.3.z] (CVE-2024-28752)\n\n* h2: Loading of custom classes from remote servers through JNDI [eap-7.3.z] (CVE-2022-23221)\n\n* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.3.z] (CVE-2022-23307)\n\n* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.3.z] (CVE-2022-23305)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.3.z] (CVE-2021-4104)\n\n* CXF: Apache CXF: SSRF Vulnerability [eap-7.3.z] (CVE-2022-46364)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging [eap-7.3.z] (CVE-2023-26464)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.3.z] (CVE-2022-34169)\n\n* xnio: StackOverflowException when the chain of notifier states becomes problematically big [eap-7.3.z] (CVE-2023-5685)\n\n* hsqldb: Untrusted input may lead to RCE attack [eap-7.3.z] (CVE-2022-41853)\n\n* server: eap-7: heap exhaustion via deserialization [eap-7.3.z] (CVE-2023-3171)\n\n* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK [eap-7.3.z] (CVE-2023-39410)\n\n* undertow: client side invocation timeout raised when calling EJB over HTTP and HTTP2 [eap-7.3.z] (CVE-2021-3859)\n\n* avro: apache-avro: Schema parsing may trigger Remote Code Execution (RCE) [eap-7.3.z] (CVE-2024-47561)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:10207", "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/index" }, { "category": "external", "summary": "2010378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { "category": "external", "summary": "2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "JBEAP-23025", "url": "https://issues.redhat.com/browse/JBEAP-23025" }, { "category": "external", "summary": "JBEAP-28084", "url": "https://issues.redhat.com/browse/JBEAP-28084" }, { "category": "external", "summary": "JBEAP-28089", "url": "https://issues.redhat.com/browse/JBEAP-28089" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10207.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.11 Security update", "tracking": { "current_release_date": "2025-08-14T16:06:58+00:00", "generator": { "date": "2025-08-14T16:06:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:10207", "initial_release_date": "2024-11-25T00:12:17+00:00", "revision_history": [ { "date": "2024-11-25T00:12:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-25T00:12:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:06:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.13-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "product": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "product_id": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-8.redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "product": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "product_id": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.3.3-2.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "product": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "product_id": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.2.3-2.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-38.redhat_00015.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-log4j-jboss-logmanager@1.2.2-2.Final_redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "product": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "product_id": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-3.redhat_00004.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-annotations-api_1.3_spec@2.0.1-4.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-12.Final_redhat_00013.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.11-4.GA_redhat_00002.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "product_id": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-8.redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-bindings@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-policy@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-common@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-dom@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-policy-stax@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-stax@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.2.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-38.redhat_00015.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-log4j-jboss-logmanager@1.2.2-2.Final_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "product": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "product_id": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-3.redhat_00004.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-annotations-api_1.3_spec@2.0.1-4.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.3@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2-to-eap7.3@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.3-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly15.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly16.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly17.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly18.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src" }, "product_reference": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch" }, "product_reference": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src" }, "product_reference": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3859", "cwe": { "id": "CWE-214", "name": "Invocation of Process Using Visible Sensitive Information" }, "discovery_date": "2021-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010378" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: client side invocation timeout raised when calling over HTTP2", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3859" }, { "category": "external", "summary": "RHBZ#2010378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3859", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3859" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: client side invocation timeout raised when calling over HTTP2" }, { "cve": "CVE-2021-4104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031667" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker\u0027s JNDI LDAP endpoint.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the conditions to be exploitable (see details below), the risk is much lower than Log4j 2.x and Red Hat has assessed this to be Moderate severity. This flaw has been filed for Log4j 1.x, and the corresponding flaw information for Log4j 2.x is available at: https://access.redhat.com/security/cve/CVE-2021-44228\n\nNote this flaw ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker\u0027s JNDI LDAP endpoint. \n\nIf the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable. However, the attack vector is reduced as it depends on having write access, which is not a standard configuration rather than untrusted user input. These are sufficient factors beyond the attacker\u0027s control.\n\nThe tomcat package shipped with Red Hat Enterprise Linux does not include log4j but it does include a default configuration for log4j, log4j.properties, which could be used with tomcat if users choose to install and configure the library. The JMSAppender is not enabled by default, and the permissions of the file can only be modified as root.\n\nRed Hat Virtualization ships log4j12-1.2.17, but it is used and configured in a way which makes this flaw not possible to exploit. Therefore impact is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "category": "external", "summary": "RHBZ#2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "RHSB-2021-009", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301" }, { "category": "external", "summary": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx", "url": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/13/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/13/1" } ], "release_date": "2021-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSAppender in the Log4j configuration if it is used\n- Remove the JMSAppender class from the classpath. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender" }, { "cve": "CVE-2022-23221", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044596" } ], "notes": [ { "category": "description", "text": "A flaw was found in the H2 Console. This flaw allows remote attackers to execute arbitrary code via a JDBC URL, concatenating with a substring that allows remote code execution by using a script.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Loading of custom classes from remote servers through JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the openshift-enterprise-3.11/metrics-hawkular-metrics-container container image ships a vulnerable version of h2 as part of the underlying images, but as it uses standard configuration and Console is not enabled/started by default, therefore the impact by this vulnerability is LOW and will not be fixed as OCP 3.x has already reached End of Full Support.\n\n[1] https://access.redhat.com/support/policy/updates/openshift_noncurrent", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23221" }, { "category": "external", "summary": "RHBZ#2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-45hx-wfhj-473x", "url": "https://github.com/advisories/GHSA-45hx-wfhj-473x" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "h2: Loading of custom classes from remote servers through JNDI" }, { "cve": "CVE-2022-23305", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041959" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JDBCAppender is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23305" }, { "category": "external", "summary": "RHBZ#2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/4", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/4" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JDBCAppender in the Log4j configuration if it is used\n- Remove the JDBCAppender class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/jdbc/JDBCAppender.class\n```", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender" }, { "cve": "CVE-2022-23307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041967" } ], "notes": [ { "category": "description", "text": "A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Unsafe deserialization flaw in Chainsaw log viewer", "title": "Vulnerability summary" }, { "category": "other", "text": "Chainsaw is a standalone graphical user interface for viewing log entries in log4j. This flaw may be bypassed by using other available means to access log entries.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization ships a vulnerable version of the log4j package, however chainsaw is not part of typical use cases. An attacker looking to exploit this would need to not only be able to generate a malicious log entry, but also have the necessary access and permissions to start chainsaw on the engine node. Therefore the impact of this vulnerability for Red Hat Virtualization is rated Low.\n\nSimilar to Red Hat Virtualization in OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of log4j package, however vulnerable chainsaw component is not used by default. Therefore the impact to OCP is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23307" }, { "category": "external", "summary": "RHBZ#2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/5", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/5" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "These are the mitigations available for this flaw for log4j 1.x:\n- Avoid using Chainsaw to view logs, and instead use some other utility, especially if there is a log view available within the product itself.\n- Remove the Chainsaw classes from the log4j jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/chainsaw/*\n```\n(log4j jars may be nested in zip archives within product)", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Unsafe deserialization flaw in Chainsaw log viewer" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-41853", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2022-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136141" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "hsqldb: Untrusted input may lead to RCE attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41853" }, { "category": "external", "summary": "RHBZ#2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41853" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853" }, { "category": "external", "summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control", "url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682", "url": "https://github.com/advisories/GHSA-77xx-rxvh-q682" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hsqldb: Untrusted input may lead to RCE attack" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSRF Vulnerability" }, { "cve": "CVE-2023-3171", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2213639" } ], "notes": [ { "category": "description", "text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "eap-7: heap exhaustion via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3171" }, { "category": "external", "summary": "RHBZ#2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171" } ], "release_date": "2023-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eap-7: heap exhaustion via deserialization" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241822" } ], "notes": [ { "category": "description", "text": "A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "xnio: StackOverflowException when the chain of notifier states becomes problematically big", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this vulnerability as an Important impact as the uncontrolled resource consumption may lead to Denial of Service (DoS). This might be intentioned by an attacker who is looking to jeopardize an environment.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5685" }, { "category": "external", "summary": "RHBZ#2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5685", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "There is currently no mitigation available for this vulnerability. Please keep the packages up-to-date as the updates become available.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xnio: StackOverflowException when the chain of notifier states becomes problematically big" }, { "cve": "CVE-2023-26464", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2182864" } ], "notes": [ { "category": "description", "text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j1-socketappender: DoS via hashmap logging", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26464" }, { "category": "external", "summary": "RHBZ#2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464" }, { "category": "external", "summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464", "url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464" } ], "release_date": "2023-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j1-socketappender: DoS via hashmap logging" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242521" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-avro. When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints, leading to an out-of-memory error and a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39410" }, { "category": "external", "summary": "RHBZ#2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/AVRO-3819", "url": "https://issues.apache.org/jira/browse/AVRO-3819" } ], "release_date": "2023-09-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270732" } ], "notes": [ { "category": "description", "text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28752" }, { "category": "external", "summary": "RHBZ#2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
rhsa-2024:8823
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)\n\n* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)\n\n* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)\n\n* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\n* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8823", "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "JBEAP-24945", "url": "https://issues.redhat.com/browse/JBEAP-24945" }, { "category": "external", "summary": "JBEAP-25035", "url": "https://issues.redhat.com/browse/JBEAP-25035" }, { "category": "external", "summary": "JBEAP-27002", "url": "https://issues.redhat.com/browse/JBEAP-27002" }, { "category": "external", "summary": "JBEAP-27194", "url": "https://issues.redhat.com/browse/JBEAP-27194" }, { "category": "external", "summary": "JBEAP-27247", "url": "https://issues.redhat.com/browse/JBEAP-27247" }, { "category": "external", "summary": "JBEAP-27276", "url": "https://issues.redhat.com/browse/JBEAP-27276" }, { "category": "external", "summary": "JBEAP-27293", "url": "https://issues.redhat.com/browse/JBEAP-27293" }, { "category": "external", "summary": "JBEAP-27392", "url": "https://issues.redhat.com/browse/JBEAP-27392" }, { "category": "external", "summary": "JBEAP-27543", "url": "https://issues.redhat.com/browse/JBEAP-27543" }, { "category": "external", "summary": "JBEAP-27585", "url": "https://issues.redhat.com/browse/JBEAP-27585" }, { "category": "external", "summary": "JBEAP-27643", "url": "https://issues.redhat.com/browse/JBEAP-27643" }, { "category": "external", "summary": "JBEAP-27659", "url": "https://issues.redhat.com/browse/JBEAP-27659" }, { "category": "external", "summary": "JBEAP-27688", "url": "https://issues.redhat.com/browse/JBEAP-27688" }, { "category": "external", "summary": "JBEAP-27694", "url": "https://issues.redhat.com/browse/JBEAP-27694" }, { "category": "external", "summary": "JBEAP-27957", "url": "https://issues.redhat.com/browse/JBEAP-27957" }, { "category": "external", "summary": "JBEAP-28057", "url": "https://issues.redhat.com/browse/JBEAP-28057" }, { "category": "external", "summary": "JBEAP-28278", "url": "https://issues.redhat.com/browse/JBEAP-28278" }, { "category": "external", "summary": "JBEAP-28289", "url": "https://issues.redhat.com/browse/JBEAP-28289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8823.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update", "tracking": { "current_release_date": "2025-08-14T16:11:55+00:00", "generator": { "date": "2025-08-14T16:11:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8823", "initial_release_date": "2024-11-04T20:13:37+00:00", "revision_history": [ { "date": "2024-11-04T20:13:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T20:13:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T16:11:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 8.0 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_id": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-core@6.2.31-1.Final_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_id": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-envers@6.2.31-1.Final_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm-util@9.6.0-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools-core@4.0.2-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-cli@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-commons@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-core-client@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-dto@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hornetq-protocol@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hqclient-protocol@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-client@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-ra@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-server@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-service-extensions@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jdbc-store@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-journal@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-selector@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-server@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-rt@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-services@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-tools@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_id": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack@800.4.0-1.GA_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl@3.0.1-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbosstxbridge@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbossxts@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-idlj@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-integration@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-api@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-bridge@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-integration@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-util@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j-api@2.0.16-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-core@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-kms@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-s3@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jmespath-java@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-tracing-api@2.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator-cdi@8.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk11@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk17@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk21@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-modules@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_id": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native-wildfly@2.0.0-2.redhat_00005.1.el8eap?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64" }, "product_reference": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-04T17:02:58.468000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2309764" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Nimbus Jose JWT package. By crafting a JWE with an excessively large p2c value, an attacker can trigger significant resource consumption during decryption, potentially leading to application slowdown or unavailability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52428" }, { "category": "external", "summary": "RHBZ#2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428" } ], "release_date": "2024-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "acknowledgments": [ { "names": [ "Tanner Emek" ] } ], "cve": "CVE-2024-8698", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2024-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2311641" } ], "notes": [ { "category": "description", "text": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak\u0027s signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8698" }, { "category": "external", "summary": "RHBZ#2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698" } ], "release_date": "2024-09-19T15:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak" }, { "acknowledgments": [ { "names": [ "Niklas Conrad", "Karsten Meyer zu Selhausen" ] } ], "cve": "CVE-2024-8883", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-09-16T06:17:01.573000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312511" } ], "notes": [ { "category": "description", "text": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a \u0027Valid Redirect URI\u0027 is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform limits access to external systems and enforces strict network security boundaries through a deny-all, allow-exception system implementation. This ensures that access to external websites and systems is strictly controlled, monitored, and, if necessary, restricted. By enforcing policies on which external sites or domains users and applications can interact with, this control minimizes the risk of users being redirected to malicious websites. For example, organizations may implement allowlists of approved URLs or domains, blocking any redirections to untrusted or unauthorized sites. The platform\u0027s implementation of boundary protection includes firewalls, gateways, and intrusion detection/prevention systems. This control prevents unauthorized traffic, including malicious redirect requests, from entering or leaving the internal network. The boundary protection control can enforce URL filtering, domain allowlisting, and content inspection to block redirection attempts to known malicious domains. When configured properly, boundary protection mechanisms ensure that even if an open redirect vulnerability is exploited, the impact is limited by blocking access to harmful external sites.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8883" }, { "category": "external", "summary": "RHBZ#2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java" } ], "release_date": "2024-09-19T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec" }, { "cve": "CVE-2024-41172", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-07-19T09:20:34+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298829" } ], "notes": [ { "category": "description", "text": "A memory consumption flaw was found in Apache CXF. This issue may allow a CXF HTTP client conduit to prevent HTTPClient instances from being garbage collected, eventually causing the application to run out of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41172" }, { "category": "external", "summary": "RHBZ#2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg", "url": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6" }, { "category": "external", "summary": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg", "url": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg" } ], "release_date": "2024-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients" } ] }
rhsa-2022:5753
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (8u342) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u332) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5753", "url": "https://access.redhat.com/errata/RHSA-2022:5753" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5753.json" } ], "title": "Red Hat Security Advisory: OpenJDK 8u342 Windows builds release and security update", "tracking": { "current_release_date": "2025-08-04T14:21:39+00:00", "generator": { "date": "2025-08-04T14:21:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:5753", "initial_release_date": "2022-07-28T15:32:23+00:00", "revision_history": [ { "date": "2022-07-28T15:32:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:32:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T14:21:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 8u342", "product": { "name": "Red Hat Build of OpenJDK 8u342", "product_id": "Red Hat Build of OpenJDK 8u342", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:1.8::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:32:23+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:32:23+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:32:23+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
wid-sec-w-2024-0671
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Jira ist eine Webanwendung zur Softwareentwicklung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der Atlassian Jira Software ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0671 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0671.json" }, { "category": "self", "summary": "WID-SEC-2024-0671 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0671" }, { "category": "external", "summary": "Atlassian Security Advisory vom 2024-03-19", "url": "https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html" } ], "source_lang": "en-US", "title": "Atlassian Jira Software: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung und DoS", "tracking": { "current_release_date": "2024-11-24T23:00:00.000+00:00", "generator": { "date": "2024-11-25T09:15:33.636+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0671", "initial_release_date": "2024-03-19T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "2", "summary": "CVSS korrigiert" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "3", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Data Center and Server \u003c9.14.1", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c9.14.1", "product_id": "T033559" } }, { "category": "product_version", "name": "Data Center and Server 9.14.1", "product": { "name": "Atlassian Jira Software Data Center and Server 9.14.1", "product_id": "T033559-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.14.1" } } }, { "category": "product_version_range", "name": "Data Center \u003c9.14.0", "product": { "name": "Atlassian Jira Software Data Center \u003c9.14.0", "product_id": "T033561" } }, { "category": "product_version", "name": "Data Center 9.14.0", "product": { "name": "Atlassian Jira Software Data Center 9.14.0", "product_id": "T033561-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center__9.14.0" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c9.13.1", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c9.13.1", "product_id": "T033563" } }, { "category": "product_version", "name": "Data Center and Server 9.13.1", "product": { "name": "Atlassian Jira Software Data Center and Server 9.13.1", "product_id": "T033563-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.13.1" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c9.12.5", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c9.12.5", "product_id": "T033564" } }, { "category": "product_version", "name": "Data Center and Server 9.12.5", "product": { "name": "Atlassian Jira Software Data Center and Server 9.12.5", "product_id": "T033564-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.12.5" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c9.4.18", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c9.4.18", "product_id": "T033566" } }, { "category": "product_version", "name": "Data Center and Server 9.4.18", "product": { "name": "Atlassian Jira Software Data Center and Server 9.4.18", "product_id": "T033566-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.4.18" } } } ], "category": "product_name", "name": "Jira Software" } ], "category": "vendor", "name": "Atlassian" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-28366", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-28366" }, { "cve": "CVE-2022-29546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-29546" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-45685", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-45685" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2022-45688" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-39410", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-39410" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T033566", "T033559", "T033563", "T033564", "T033561" ] }, "release_date": "2024-03-19T23:00:00.000+00:00", "title": "CVE-2023-5072" } ] }
wid-sec-w-2024-1659
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Insurance Applications ist eine Produktfamilie mit L\u00f6sungen f\u00fcr die Versicherungsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Insurance Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1659 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1659.json" }, { "category": "self", "summary": "WID-SEC-2024-1659 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1659" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle Insurance Applications vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixINSU" } ], "source_lang": "en-US", "title": "Oracle Insurance Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:32.285+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1659", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.6.4", "product": { "name": "Oracle Insurance Applications 12.6.4", "product_id": "T020709", "product_identification_helper": { "cpe": "cpe:/a:oracle:insurance_applications:12.6.4" } } }, { "category": "product_version", "name": "12.7.1", "product": { "name": "Oracle Insurance Applications 12.7.1", "product_id": "T028713", "product_identification_helper": { "cpe": "cpe:/a:oracle:insurance_applications:12.7.1" } } }, { "category": "product_version", "name": "11.2.12", "product": { "name": "Oracle Insurance Applications 11.2.12", "product_id": "T036227", "product_identification_helper": { "cpe": "cpe:/a:oracle:insurance_applications:11.2.12" } } }, { "category": "product_version_range", "name": "\u003c=11.3.2", "product": { "name": "Oracle Insurance Applications \u003c=11.3.2", "product_id": "T036228" } } ], "category": "product_name", "name": "Insurance Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2020-13956" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-21036", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-21036" }, { "cve": "CVE-2023-29081", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-29081" }, { "cve": "CVE-2024-22257", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23635", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23635" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Insurance Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036227", "T028713", "T020709" ], "last_affected": [ "T036228" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-26308" } ] }
wid-sec-w-2022-0746
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenJDK ist eine Java Umgebung, die unter der GPLv2 ver\u00f6ffentlicht wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenJDK ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0746 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0746.json" }, { "category": "self", "summary": "WID-SEC-2022-0746 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0746" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108540 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108543 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108547 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108554 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5685 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5684 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5684" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5681 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5681" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5687 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5687" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5683 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5683" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5188 vom 2022-07-22", "url": "https://lists.debian.org/debian-security-announce/2022/msg00157.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5695 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5695.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5696 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5697 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5698 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5698" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5700 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5700" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5701 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5701" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5695 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5695" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5709 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5709" }, { "category": "external", "summary": "Debian Security Advisory DSA-5192 vom 2022-07-26", "url": "https://lists.debian.org/debian-security-announce/2022/msg00161.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5726 vom 2022-07-27", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5709 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5709.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5726 vom 2022-07-27", "url": "http://linux.oracle.com/errata/ELSA-2022-5726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5736 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5736 vom 2022-07-28", "url": "http://linux.oracle.com/errata/ELSA-2022-5736.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5756 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5756" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5757 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5755 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5754 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5754" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5753 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5753" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5758 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-107 vom 2022-07-28", "url": "https://downloads.avaya.com/css/P8/documents/101083044" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2610-1 vom 2022-08-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5698 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073599.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5687 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073598.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-121 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-121.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2707-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2819-1 vom 2022-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2856-1 vom 2022-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3152-1 vom 2022-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1836 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1836.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2JAVA-OPENJDK11-2022-002 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2022-002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3708 vom 2024-06-06", "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "source_lang": "en-US", "title": "OpenJDK: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-06-06T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:32:00.556+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0746", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian, Red Hat, Fedora und Oracle Linux aufgenommen" }, { "date": "2022-07-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-31T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-21T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "185975", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:1.6.0" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Camel for Spring Boot 1", "product": { "name": "Red Hat Integration Camel for Spring Boot 1", "product_id": "T035240", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_for_spring_boot_1" } } } ], "category": "product_name", "name": "Integration" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-34169" } ] }
wid-sec-w-2022-0759
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0759 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0759.json" }, { "category": "self", "summary": "WID-SEC-2022-0759 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0759" }, { "category": "external", "summary": "Menu - Appendix Oracle Java SE vom 2022-07-19", "url": "https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1824 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1824.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1823 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1823.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "https://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-25", "url": "https://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2660-1 vom 2022-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-120 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-120.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-119 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-119.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-127 vom 2022-08-09", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-127/index.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2898-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2899-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2949-1 vom 2022-08-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3092-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5227 vom 2022-09-07", "url": "https://lists.debian.org/debian-security-announce/2022/msg00196.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1633 vom 2022-09-12", "url": "https://alas.aws.amazon.com/ALAS-2022-1633.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1835 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1835.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4166-1 vom 2022-11-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" }, { "category": "external", "summary": "Juniper Security Advisory JSA70185 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US" }, { "category": "external", "summary": "IBM Security Bulletin 6856221 vom 2023-01-18", "url": "https://www.ibm.com/support/pages/node/6856221" }, { "category": "external", "summary": "IBM Security Bulletin 7014699 vom 2023-07-26", "url": "https://www.ibm.com/support/pages/node/7014699" }, { "category": "external", "summary": "IBM Security Bulletin 7140420 vom 2024-03-13", "url": "https://www.ibm.com/support/pages/node/7140420" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-16 vom 2024-05-05", "url": "https://security.gentoo.org/glsa/202405-16" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3780 vom 2024-06-10", "url": "https://access.redhat.com/errata/RHSA-2024:3780" }, { "category": "external", "summary": "IBM Security Bulletin 7157366 vom 2024-06-19", "url": "https://www.ibm.com/support/pages/node/7157366" }, { "category": "external", "summary": "### vom 2024-10-15", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24999" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8076 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8075 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8080 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8077 vom 2024-10-14", "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8823 vom 2024-11-04", "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8824 vom 2024-11-04", "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8826 vom 2024-11-04", "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "external", "summary": "Change Log for Amazon Corretto 11 vom 2025-01-21", "url": "https://github.com/corretto/corretto-11/blob/ece67a968d57210c69d3b9153576613846c1cacf/CHANGELOG.md" }, { "category": "external", "summary": "Change Log for Amazon Corretto 8 vom 2025-01-21", "url": "https://github.com/corretto/corretto-8/blob/14eb6b297ac476ca5734706b40903e5a69ecd74a/CHANGELOG.md" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:0066-1 vom 2025-02-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" }, { "category": "external", "summary": "IBM Security Bulletin 7233394 vom 2025-05-14", "url": "https://www.ibm.com/support/pages/node/7233394" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-05-14T22:00:00.000+00:00", "generator": { "date": "2025-05-15T09:09:20.662+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2022-0759", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux und Amazon aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-08-25T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-31T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2023-01-18T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-19T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-04T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-05-14T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "26" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.26.4.1", "product": { "name": "Amazon Corretto \u003c11.0.26.4.1", "product_id": "T040500" } }, { "category": "product_version", "name": "11.0.26.4.1", "product": { "name": "Amazon Corretto 11.0.26.4.1", "product_id": "T040500-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:11.0.26.4.1" } } }, { "category": "product_version_range", "name": "\u003c8.442.06.1", "product": { "name": "Amazon Corretto \u003c8.442.06.1", "product_id": "T040501" } }, { "category": "product_version", "name": "8.442.06.1", "product": { "name": "Amazon Corretto 8.442.06.1", "product_id": "T040501-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:8.442.06.1" } } } ], "category": "product_name", "name": "Corretto" }, { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.3.0a", "product": { "name": "Broadcom Brocade SANnav \u003c2.3.0a", "product_id": "T034391" } }, { "category": "product_version", "name": "2.3.0a", "product": { "name": "Broadcom Brocade SANnav 2.3.0a", "product_id": "T034391-fixed", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:2.3.0a" } } }, { "category": "product_version_range", "name": "\u003c2.3.1a", "product": { "name": "Broadcom Brocade SANnav \u003c2.3.1a", "product_id": "T038317" } }, { "category": "product_version", "name": "2.3.1a", "product": { "name": "Broadcom Brocade SANnav 2.3.1a", "product_id": "T038317-fixed", "product_identification_helper": { "cpe": "cpe:/a:broadcom:brocade_sannav:2.3.1a" } } } ], "category": "product_name", "name": "Brocade SANnav" } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "IBM FlashSystem", "product": { "name": "IBM FlashSystem", "product_id": "T025159", "product_identification_helper": { "cpe": "cpe:/a:ibm:flashsystem:-" } } }, { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP12", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP12", "product_id": "T043784" } }, { "category": "product_version", "name": "7.5.0 UP12", "product": { "name": "IBM QRadar SIEM 7.5.0 UP12", "product_id": "T043784-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up12" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "category": "product_name", "name": "IBM SAN Volume Controller", "product": { "name": "IBM SAN Volume Controller", "product_id": "T020642", "product_identification_helper": { "cpe": "cpe:/a:ibm:san_volume_controller:-" } } }, { "category": "product_name", "name": "IBM Storwize", "product": { "name": "IBM Storwize", "product_id": "T021621", "product_identification_helper": { "cpe": "cpe:/a:ibm:storwize:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space", "product": { "name": "Juniper Junos Space", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.0.15.1", "product": { "name": "Oracle Java SE 11.0.15.1", "product_id": "T023943", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.15.1" } } }, { "category": "product_version", "name": "17.0.3.1", "product": { "name": "Oracle Java SE 17.0.3.1", "product_id": "T023944", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.3.1" } } }, { "category": "product_version", "name": "21.3.2", "product": { "name": "Oracle Java SE 21.3.2", "product_id": "T023945", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.3.2" } } }, { "category": "product_version", "name": "22.1.0", "product": { "name": "Oracle Java SE 22.1.0", "product_id": "T023946", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:22.1.0" } } }, { "category": "product_version", "name": "7u343", "product": { "name": "Oracle Java SE 7u343", "product_id": "T023985", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:7u343" } } }, { "category": "product_version", "name": "8u333", "product": { "name": "Oracle Java SE 8u333", "product_id": "T023986", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u333" } } }, { "category": "product_version", "name": "18.0.1.1", "product": { "name": "Oracle Java SE 18.0.1.1", "product_id": "T023987", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:18.0.1.1" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 21.3.2", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 21.3.2", "product_id": "T023989", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_21.3.2" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 20.3.6", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.6", "product_id": "T023990", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_20.3.6" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T004914", "T043784", "T020642", "T020304", "398363", "T025159", "T023990", "T038317", "T012167", "T017562", "T022954", "T023944", "T021621", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T034391", "T023986", "T023943", "T023987", "T027843", "T040501", "T002366", "T040500" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T004914", "T043784", "T020642", "T020304", "398363", "T025159", "T023990", "T038317", "T012167", "T017562", "T022954", "T023944", "T021621", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T034391", "T023986", "T023943", "T023987", "T027843", "T040501", "T002366", "T040500" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T004914", "T043784", "T020642", "T020304", "398363", "T025159", "T023990", "T038317", "T012167", "T017562", "T022954", "T023944", "T021621", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T034391", "T023986", "T023943", "T023987", "T027843", "T040501", "T002366", "T040500" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-25647", "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T004914", "T043784", "T020642", "T020304", "398363", "T025159", "T023990", "T038317", "T012167", "T017562", "T022954", "T023944", "T021621", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T034391", "T023986", "T023943", "T023987", "T027843", "T040501", "T002366", "T040500" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-34169", "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T004914", "T043784", "T020642", "T020304", "398363", "T025159", "T023990", "T038317", "T012167", "T017562", "T022954", "T023944", "T021621", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T034391", "T023986", "T023943", "T023987", "T027843", "T040501", "T002366", "T040500" ] }, "release_date": "2022-07-19T22:00:00.000+00:00", "title": "CVE-2022-34169" } ] }
wid-sec-w-2024-0788
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0788.json" }, { "category": "self", "summary": "WID-SEC-2024-0788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0788" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-04-03", "url": "https://www.ibm.com/support/pages/node/7145900" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-03T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:07:15.551+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0788", "initial_release_date": "2024-04-03T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 23.0.2-IF003", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2-IF003", "product_id": "T033899" } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in der Drittanbieter-Komponente \"Apache Xalan-Java\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen." } ], "release_date": "2024-04-03T22:00:00.000+00:00", "title": "CVE-2014-0107" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in der Drittanbieter-Komponente \"Apache Xalan-Java\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen." } ], "release_date": "2024-04-03T22:00:00.000+00:00", "title": "CVE-2022-34169" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-27T23:00:00.000+00:00", "generator": { "date": "2024-11-28T11:39:04.623+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.0", "product": { "name": "Dell ECS \u003c3.8.1.0", "product_id": "T033919" } }, { "category": "product_version", "name": "3.8.1.0", "product": { "name": "Dell ECS 3.8.1.0", "product_id": "T033919-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-21626" } ] }
wid-sec-w-2025-1565
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Retail Applications ist eine Sammlung von Produkten zur Unterst\u00fctzung u. a. von Handelsfirmen und der Gastronomie.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Retail Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1565 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1565.json" }, { "category": "self", "summary": "WID-SEC-2025-1565 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1565" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2025 - Appendix Oracle Retail Applications vom 2025-07-15", "url": "https://www.oracle.com/security-alerts/cpujul2025.html#AppendixRAPP" } ], "source_lang": "en-US", "title": "Oracle Retail Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-15T22:00:00.000+00:00", "generator": { "date": "2025-07-16T08:31:56.910+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1565", "initial_release_date": "2025-07-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "16.0.3", "product": { "name": "Oracle Retail Applications 16.0.3", "product_id": "T019034", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:16.0.3" } } }, { "category": "product_version", "name": "19.0.1", "product": { "name": "Oracle Retail Applications 19.0.1", "product_id": "T019038", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:19.0.1" } } }, { "category": "product_version", "name": "15.0.3.1", "product": { "name": "Oracle Retail Applications 15.0.3.1", "product_id": "T019909", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:15.0.3.1" } } }, { "category": "product_version", "name": "14.1.3.2", "product": { "name": "Oracle Retail Applications 14.1.3.2", "product_id": "T019910", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:14.1.3.2" } } }, { "category": "product_version", "name": "20.0.1", "product": { "name": "Oracle Retail Applications 20.0.1", "product_id": "T019911", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:20.0.1" } } }, { "category": "product_version", "name": "15.0.3", "product": { "name": "Oracle Retail Applications 15.0.3", "product_id": "T020721", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:15.0.3" } } }, { "category": "product_version", "name": "21.0.0", "product": { "name": "Oracle Retail Applications 21.0.0", "product_id": "T022878", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:21.0.0" } } }, { "category": "product_version", "name": "13.2.5", "product": { "name": "Oracle Retail Applications 13.2.5", "product_id": "T023957", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:13.2.5" } } }, { "category": "product_version", "name": "22.0.0", "product": { "name": "Oracle Retail Applications 22.0.0", "product_id": "T030616", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:22.0.0" } } }, { "category": "product_version", "name": "23.0.0", "product": { "name": "Oracle Retail Applications 23.0.0", "product_id": "T032127", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:23.0.0" } } }, { "category": "product_version", "name": "20.0.5", "product": { "name": "Oracle Retail Applications 20.0.5", "product_id": "T042831", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:20.0.5" } } }, { "category": "product_version", "name": "21.0.4", "product": { "name": "Oracle Retail Applications 21.0.4", "product_id": "T042832", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:21.0.4" } } }, { "category": "product_version", "name": "22.0.2", "product": { "name": "Oracle Retail Applications 22.0.2", "product_id": "T042833", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:22.0.2" } } }, { "category": "product_version", "name": "23.0.2", "product": { "name": "Oracle Retail Applications 23.0.2", "product_id": "T042834", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:23.0.2" } } }, { "category": "product_version", "name": "24.0.1", "product": { "name": "Oracle Retail Applications 24.0.1", "product_id": "T042835", "product_identification_helper": { "cpe": "cpe:/a:oracle:retail_applications:24.0.1" } } } ], "category": "product_name", "name": "Retail Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2024-38819", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2024-38819" }, { "cve": "CVE-2024-47072", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2024-47554" }, { "cve": "CVE-2024-6763", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2024-6763" }, { "cve": "CVE-2025-24970", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-24970" }, { "cve": "CVE-2025-31651", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-31651" }, { "cve": "CVE-2025-48734", "product_status": { "known_affected": [ "T032127", "T042835", "T019034", "T019038", "T022878", "T023957", "T019911", "T042831", "T019910", "T042832", "T042833", "T020721", "T042834", "T030616", "T019909" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-48734" } ] }
wid-sec-w-2025-1563
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1563 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1563.json" }, { "category": "self", "summary": "WID-SEC-2025-1563 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1563" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2025 - Appendix Oracle Supply Chain vom 2025-07-15", "url": "https://www.oracle.com/security-alerts/cpujul2025.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-15T22:00:00.000+00:00", "generator": { "date": "2025-07-16T08:31:56.339+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1563", "initial_release_date": "2025-07-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_version", "name": "21.0.2", "product": { "name": "Oracle Supply Chain 21.0.2", "product_id": "T020726", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2" } } }, { "category": "product_version", "name": "3.6.1", "product": { "name": "Oracle Supply Chain 3.6.1", "product_id": "T021722", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:3.6.1" } } }, { "category": "product_version", "name": "21.1.0", "product": { "name": "Oracle Supply Chain 21.1.0", "product_id": "T038411", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.1.0" } } }, { "category": "product_version", "name": "6.2.1", "product": { "name": "Oracle Supply Chain 6.2.1", "product_id": "T040481", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.2.1" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-42575", "product_status": { "known_affected": [ "T040481", "T021722", "T019052", "T020726", "T038411" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2021-42575" }, { "cve": "CVE-2022-34169", "product_status": { "known_affected": [ "T040481", "T021722", "T019052", "T020726", "T038411" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2024-22201", "product_status": { "known_affected": [ "T040481", "T021722", "T019052", "T020726", "T038411" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2024-22201" }, { "cve": "CVE-2024-47554", "product_status": { "known_affected": [ "T040481", "T021722", "T019052", "T020726", "T038411" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2024-47554" }, { "cve": "CVE-2025-27363", "product_status": { "known_affected": [ "T040481", "T021722", "T019052", "T020726", "T038411" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-27363" }, { "cve": "CVE-2025-31651", "product_status": { "known_affected": [ "T040481", "T021722", "T019052", "T020726", "T038411" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-31651" } ] }
wid-sec-w-2023-2368
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Operational Decision Manager ist Software f\u00fcr die Integration von Gesch\u00e4ftsereignissen und Gesch\u00e4ftsregeln, um Entscheidungen \u00fcber verschiedene Prozesse und Anwendungen hinweg zu automatisieren.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in IBM Operational Decision Manager ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2368 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2368.json" }, { "category": "self", "summary": "WID-SEC-2023-2368 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2368" }, { "category": "external", "summary": "IBM Security Bulletin - 7032928 vom 2023-09-14", "url": "https://www.ibm.com/support/pages/node/7032928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6138 vom 2023-10-26", "url": "https://access.redhat.com/errata/RHSA-2023:6138" }, { "category": "external", "summary": "IBM Security Bulletin 7105614 vom 2024-01-08", "url": "https://www.ibm.com/support/pages/node/7105614" } ], "source_lang": "en-US", "title": "IBM Operational Decision Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-07T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:58:31.143+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2368", "initial_release_date": "2023-09-14T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-07T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.10.5.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.10.5.1", "product_id": "T029909", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.5.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.11.0.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.11.0.1", "product_id": "T029910", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.0.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.11.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.11.1", "product_id": "T029911", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.12.0", "product": { "name": "IBM Operational Decision Manager \u003c 8.12.0", "product_id": "T029912", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.12.0" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager 8.10.5.1 \u003c IF049", "product": { "name": "IBM Operational Decision Manager 8.10.5.1 \u003c IF049", "product_id": "T031894", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.5.1__if049" } } } ], "category": "product_name", "name": "Operational Decision Manager" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der HttpURI-Klasse der Eclipse Jetty-Komponente. Durch das Senden einer speziell gestalteten Anfrage kann ein Angreifer diese Schwachstelle ausnutzen, um die Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Apache Xalan-Java-Komponente aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Ausgabeeigenschaften. Ein entfernter Angreifer kann diese Schwachstelle zur Umgehung von Sicherheitsma\u00dfnahmen ausnutzen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2014-0107" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht im Node.js http-cache-semantics-Modul aufgrund eines Denial of Service (ReDoS) durch regul\u00e4re Ausdr\u00fccke. Durch das Senden einer speziell gestalteten Regex-Eingabe unter Verwendung von Request-Header-Werten kann ein entfernter Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Apache Xalan Java XSLT Bibliothekskomponente aufgrund eines Integer Truncation Problems bei der Verarbeitung von b\u00f6sartigen XSLT Stylesheets. Ein entfernter Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen" } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Postgresql JDBC-Komponente aufgrund eines nicht eingeschr\u00e4nkten Zugriffs zum Erstellen lesbarer Dateien im TemporaryFolder. Durch das Senden einer speziell gestalteten Anfrage kann ein Angreifer diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2022-41946" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Komponente VMware Tanzu Spring Security aufgrund einer unsachgem\u00e4\u00dfen Validierung von Benutzereingaben. Mit einer speziell gestalteten Konfiguration kann ein Angreifer diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-37460", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Komponente Plexus Archiver aufgrund der Verfolgung eines symbolischen Links in der Funktion resolveFile(). Durch Extrahieren einer speziell gestalteten Archivdatei, die einen symbolischen Link enth\u00e4lt, mit AbstractUnArchiver kann ein Angreifer diese Schwachstelle ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00.000+00:00", "title": "CVE-2023-37460" } ] }
wid-sec-w-2024-1653
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Siebel CRM ist eine CRM-L\u00f6sung von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Siebel CRM ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1653 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1653.json" }, { "category": "self", "summary": "WID-SEC-2024-1653 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1653" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle Siebel CRM vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixSECR" } ], "source_lang": "en-US", "title": "Oracle Siebel CRM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:30.064+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1653", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=22.12", "product": { "name": "Oracle Siebel CRM \u003c=22.12", "product_id": "T028728" } }, { "category": "product_version_range", "name": "\u003c=23.12", "product": { "name": "Oracle Siebel CRM \u003c=23.12", "product_id": "T032128" } }, { "category": "product_version_range", "name": "\u003c=24.2", "product": { "name": "Oracle Siebel CRM \u003c=24.2", "product_id": "T034189" } }, { "category": "product_version_range", "name": "\u003c=24.6", "product": { "name": "Oracle Siebel CRM \u003c=24.6", "product_id": "T036242" } }, { "category": "product_version_range", "name": "\u003c=24.3", "product": { "name": "Oracle Siebel CRM \u003c=24.3", "product_id": "T036243" } }, { "category": "product_version_range", "name": "\u003c=24.1", "product": { "name": "Oracle Siebel CRM \u003c=24.1", "product_id": "T036244" } }, { "category": "product_version_range", "name": "\u003c=23.11", "product": { "name": "Oracle Siebel CRM \u003c=23.11", "product_id": "T036245" } }, { "category": "product_version_range", "name": "\u003c=22.3", "product": { "name": "Oracle Siebel CRM \u003c=22.3", "product_id": "T036246" } }, { "category": "product_version_range", "name": "\u003c=24.4", "product": { "name": "Oracle Siebel CRM \u003c=24.4", "product_id": "T036247" } } ], "category": "product_name", "name": "Siebel CRM" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36090", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-36090" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-46589" }, { "cve": "CVE-2023-47627", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-47627" }, { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-5678", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5764", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T028728", "T032128", "T036245", "T036246", "T036247", "T036242", "T034189", "T036243", "T036244" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-5764" } ] }
wid-sec-w-2025-0144
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0144 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0144.json" }, { "category": "self", "summary": "WID-SEC-2025-0144 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0144" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle Financial Services Applications vom 2025-01-21", "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-21T23:00:00.000+00:00", "generator": { "date": "2025-01-22T09:43:52.607+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0144", "initial_release_date": "2025-01-21T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-21T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_version", "name": "8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_version", "name": "8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_version", "name": "8.1.2.6", "product": { "name": "Oracle Financial Services Applications 8.1.2.6", "product_id": "T032104", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.6" } } }, { "category": "product_version", "name": "8.1.2.7", "product": { "name": "Oracle Financial Services Applications 8.1.2.7", "product_id": "T036217", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.7" } } }, { "category": "product_version", "name": "8.1.2.8", "product": { "name": "Oracle Financial Services Applications 8.1.2.8", "product_id": "T038392", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.8" } } }, { "category": "product_version", "name": "14.7.5.0.0", "product": { "name": "Oracle Financial Services Applications 14.7.5.0.0", "product_id": "T038393", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.5.0.0" } } }, { "category": "product_version", "name": "8.0.7.8", "product": { "name": "Oracle Financial Services Applications 8.0.7.8", "product_id": "T040464", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8" } } }, { "category": "product_version", "name": "8.0.8.6", "product": { "name": "Oracle Financial Services Applications 8.0.8.6", "product_id": "T040465", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.6" } } }, { "category": "product_version", "name": "8.1.3.0", "product": { "name": "Oracle Financial Services Applications 8.1.3.0", "product_id": "T040466", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.3.0" } } }, { "category": "product_version", "name": "2.9.0.0.0-7.0.0.0.0", "product": { "name": "Oracle Financial Services Applications 2.9.0.0.0-7.0.0.0.0", "product_id": "T040516", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.0.0.0_-_7.0.0.0.0" } } }, { "category": "product_version", "name": "14.4.0.0.0-14.7.0.0.0", "product": { "name": "Oracle Financial Services Applications 14.4.0.0.0-14.7.0.0.0", "product_id": "T040517", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.4.0.0.0_-_14.7.0.0.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-26031", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-26031" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-39410", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44483", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-44483" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51074", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-51074" }, { "cve": "CVE-2023-52070", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2023-52070" }, { "cve": "CVE-2024-28219", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-28219" }, { "cve": "CVE-2024-34064", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34750", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35195", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-35195" }, { "cve": "CVE-2024-38819", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38827", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-38827" }, { "cve": "CVE-2024-45492", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2024-45492" }, { "cve": "CVE-2025-21550", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021677", "T022844", "T032104", "T038393", "T040517", "T028706", "T036217", "T040516", "T038392", "T040466", "T040465", "T040464" ] }, "release_date": "2025-01-21T23:00:00.000+00:00", "title": "CVE-2025-21550" } ] }
wid-sec-w-2024-1642
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1642 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1642.json" }, { "category": "self", "summary": "WID-SEC-2024-1642 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1642" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle Communications vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixCGBU" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6016 vom 2024-09-05", "url": "https://access.redhat.com/errata/RHSA-2024:6016" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9975 vom 2024-11-21", "url": "https://access.redhat.com/errata/RHSA-2024:9975" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9976 vom 2024-11-21", "url": "https://access.redhat.com/errata/RHSA-2024:9976" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-20T23:00:00.000+00:00", "generator": { "date": "2024-11-21T13:09:50.776+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1642", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "23.1.0", "product": { "name": "Oracle Communications 23.1.0", "product_id": "T027326", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.1.0" } } }, { "category": "product_version", "name": "12.6.1.0.0", "product": { "name": "Oracle Communications 12.6.1.0.0", "product_id": "T027338", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.1.0.0" } } }, { "category": "product_version", "name": "5.1", "product": { "name": "Oracle Communications 5.1", "product_id": "T028684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.1" } } }, { "category": "product_version", "name": "15.0.0.0.0", "product": { "name": "Oracle Communications 15.0.0.0.0", "product_id": "T032090", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0.0.0" } } }, { "category": "product_version", "name": "23.4.0", "product": { "name": "Oracle Communications 23.4.0", "product_id": "T032091", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.0" } } }, { "category": "product_version", "name": "23.4.1", "product": { "name": "Oracle Communications 23.4.1", "product_id": "T034143", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.1" } } }, { "category": "product_version", "name": "23.4.2", "product": { "name": "Oracle Communications 23.4.2", "product_id": "T034144", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.2" } } }, { "category": "product_version", "name": "24.1.0", "product": { "name": "Oracle Communications 24.1.0", "product_id": "T034145", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0" } } }, { "category": "product_version", "name": "5.2", "product": { "name": "Oracle Communications 5.2", "product_id": "T034146", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.2" } } }, { "category": "product_version_range", "name": "\u003c=23.4.3", "product": { "name": "Oracle Communications \u003c=23.4.3", "product_id": "T036195" } }, { "category": "product_version_range", "name": "\u003c=23.4.3", "product": { "name": "Oracle Communications \u003c=23.4.3", "product_id": "T036195-fixed" } }, { "category": "product_version_range", "name": "\u003c=23.4.4", "product": { "name": "Oracle Communications \u003c=23.4.4", "product_id": "T036196" } }, { "category": "product_version_range", "name": "\u003c=23.4.4", "product": { "name": "Oracle Communications \u003c=23.4.4", "product_id": "T036196-fixed" } }, { "category": "product_version", "name": "24.2.0", "product": { "name": "Oracle Communications 24.2.0", "product_id": "T036197", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.0" } } }, { "category": "product_version_range", "name": "\u003c=8.6.0.8", "product": { "name": "Oracle Communications \u003c=8.6.0.8", "product_id": "T036198" } }, { "category": "product_version_range", "name": "\u003c=8.6.0.8", "product": { "name": "Oracle Communications \u003c=8.6.0.8", "product_id": "T036198-fixed" } }, { "category": "product_version", "name": "46.6.4", "product": { "name": "Oracle Communications 46.6.4", "product_id": "T036199", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:46.6.4" } } }, { "category": "product_version", "name": "46.6.5", "product": { "name": "Oracle Communications 46.6.5", "product_id": "T036200", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:46.6.5" } } }, { "category": "product_version", "name": "12.11.3", "product": { "name": "Oracle Communications 12.11.3", "product_id": "T036201", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.3" } } }, { "category": "product_version", "name": "12.11.4", "product": { "name": "Oracle Communications 12.11.4", "product_id": "T036202", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.4" } } }, { "category": "product_version_range", "name": "\u003c=8.6.0.6", "product": { "name": "Oracle Communications \u003c=8.6.0.6", "product_id": "T036203" } }, { "category": "product_version_range", "name": "\u003c=8.6.0.6", "product": { "name": "Oracle Communications \u003c=8.6.0.6", "product_id": "T036203-fixed" } }, { "category": "product_version", "name": "10.5", "product": { "name": "Oracle Communications 10.5", "product_id": "T036204", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.5" } } }, { "category": "product_version", "name": "4.1.0", "product": { "name": "Oracle Communications 4.1.0", "product_id": "T036205", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.1.0" } } }, { "category": "product_version", "name": "4.2.0", "product": { "name": "Oracle Communications 4.2.0", "product_id": "T036206", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.2.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "Oracle Communications 9.2.0", "product_id": "T036207", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "Oracle Communications 9.3.0", "product_id": "T036208", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.3.0" } } }, { "category": "product_version", "name": "12.11.0", "product": { "name": "Oracle Communications 12.11.0", "product_id": "T036209", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.0" } } }, { "category": "product_version_range", "name": "\u003c=9.0.3", "product": { "name": "Oracle Communications \u003c=9.0.3", "product_id": "T036210" } }, { "category": "product_version_range", "name": "\u003c=9.0.3", "product": { "name": "Oracle Communications \u003c=9.0.3", "product_id": "T036210-fixed" } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-41184" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-48174", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-48174" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52425", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-5685", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-5685" }, { "cve": "CVE-2024-0450", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-22019", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22019" }, { "cve": "CVE-2024-22201", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22234", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22234" }, { "cve": "CVE-2024-22257", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23897", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23897" }, { "cve": "CVE-2024-24549", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25710", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27316", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28182", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28752" }, { "cve": "CVE-2024-28849", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-29025" }, { "cve": "CVE-2024-2961", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-2961" }, { "cve": "CVE-2024-34064", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34069", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-34069" }, { "cve": "CVE-2024-6162", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-6162" } ] }
wid-sec-w-2024-1622
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Commerce ist eine elektronische Handelsplattform.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Commerce ausnutzen, um die Vertraulichkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1622 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1622.json" }, { "category": "self", "summary": "WID-SEC-2024-1622 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1622" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle Commerce vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixOCOM" } ], "source_lang": "en-US", "title": "Oracle Commerce: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:21.987+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1622", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "11.3.0", "product": { "name": "Oracle Commerce 11.3.0", "product_id": "T018931", "product_identification_helper": { "cpe": "cpe:/a:oracle:commerce:11.3.0" } } }, { "category": "product_version", "name": "11.3.1", "product": { "name": "Oracle Commerce 11.3.1", "product_id": "T018932", "product_identification_helper": { "cpe": "cpe:/a:oracle:commerce:11.3.1" } } }, { "category": "product_version", "name": "11.3.2", "product": { "name": "Oracle Commerce 11.3.2", "product_id": "T018933", "product_identification_helper": { "cpe": "cpe:/a:oracle:commerce:11.3.2" } } } ], "category": "product_name", "name": "Commerce" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-24549", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-24549" }, { "cve": "CVE-2024-28752", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28752" }, { "cve": "CVE-2024-29025", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-29025" } ] }
wid-sec-w-2023-0122
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0122 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0122.json" }, { "category": "self", "summary": "WID-SEC-2023-0122 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0122" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Supply Chain vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-17T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:41:43.641+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0122", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Supply Chain 9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.1", "product": { "name": "Oracle Supply Chain 12.1", "product_id": "T019054", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.1" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2", "product": { "name": "Oracle Supply Chain 12.2", "product_id": "T019055", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.11", "product": { "name": "Oracle Supply Chain 12.2.11", "product_id": "T021721", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.11" } } }, { "category": "product_name", "name": "Oracle Supply Chain \u003c 21.0.2.6", "product": { "name": "Oracle Supply Chain \u003c 21.0.2.6", "product_id": "T025892", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2.6" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.7", "product": { "name": "Oracle Supply Chain 12.2.7", "product_id": "T025893", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.7" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.8", "product": { "name": "Oracle Supply Chain 12.2.8", "product_id": "T025894", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.8" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.9", "product": { "name": "Oracle Supply Chain 12.2.9", "product_id": "T025895", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.9" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.10", "product": { "name": "Oracle Supply Chain 12.2.10", "product_id": "T025896", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.10" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.12", "product": { "name": "Oracle Supply Chain 12.2.12", "product_id": "T025897", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.12" } } }, { "category": "product_name", "name": "Oracle Supply Chain \u003c 21.0.2.0", "product": { "name": "Oracle Supply Chain \u003c 21.0.2.0", "product_id": "T025898", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2.0" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21850", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2023-21850" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2022-24839" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2021-44832" }, { "cve": "CVE-2020-27844", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2020-27844" }, { "cve": "CVE-2019-7317", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2019-7317" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00.000+00:00", "title": "CVE-2019-12415" } ] }
wid-sec-w-2024-0124
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0124 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0124.json" }, { "category": "self", "summary": "WID-SEC-2024-0124 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0124" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2024 - Appendix Oracle Financial Services Applications vom 2024-01-16", "url": "https://www.oracle.com/security-alerts/cpujan2024.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-16T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:03:50.294+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0124", "initial_release_date": "2024-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 2.7.1", "product": { "name": "Oracle Financial Services Applications 2.7.1", "product_id": "T018979", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.8.0", "product": { "name": "Oracle Financial Services Applications 2.8.0", "product_id": "T018980", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.0", "product": { "name": "Oracle Financial Services Applications 2.9.0", "product_id": "T018981", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.0", "product_id": "T018983", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.9", "product": { "name": "Oracle Financial Services Applications 8.0.9", "product_id": "T019890", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.9" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1", "product_id": "T019891", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7", "product": { "name": "Oracle Financial Services Applications 8.0.7", "product_id": "T021676", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.1", "product": { "name": "Oracle Financial Services Applications 2.9.1", "product_id": "T027359", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2", "product": { "name": "Oracle Financial Services Applications 8.1.2", "product_id": "T028705", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7.0", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7.0", "product_id": "T028707", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1.0", "product": { "name": "Oracle Financial Services Applications 22.1.0", "product_id": "T032101", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2.0", "product": { "name": "Oracle Financial Services Applications 22.2.0", "product_id": "T032102", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1.0", "product": { "name": "Oracle Financial Services Applications 21.1.0", "product_id": "T032103", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.6", "product": { "name": "Oracle Financial Services Applications 8.1.2.6", "product_id": "T032104", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1.0", "product": { "name": "Oracle Financial Services Applications 19.1.0", "product_id": "T032105", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 5.0.0", "product": { "name": "Oracle Financial Services Applications 5.0.0", "product_id": "T032106", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 5.1.0", "product": { "name": "Oracle Financial Services Applications 5.1.0", "product_id": "T032107", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 3.2.0", "product": { "name": "Oracle Financial Services Applications \u003c= 3.2.0", "product_id": "T032108", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 4.0.0", "product": { "name": "Oracle Financial Services Applications 4.0.0", "product_id": "T032109", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:4.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 6.0.0", "product": { "name": "Oracle Financial Services Applications 6.0.0", "product_id": "T032110", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:6.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.3.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.3.0", "product_id": "T032111", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.0.0", "product": { "name": "Oracle Financial Services Applications 3.0.0", "product_id": "T032112", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.1.0", "product": { "name": "Oracle Financial Services Applications 3.1.0", "product_id": "T032113", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.1.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-46604", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-46604" }, { "cve": "CVE-2023-44483", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-44483" }, { "cve": "CVE-2023-42503", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-42503" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-2618", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-2618" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-21901", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-21901" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2023-1370" }, { "cve": "CVE-2022-44729", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-44729" }, { "cve": "CVE-2022-42920", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-42920" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-36944", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-36944" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31160", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-31160" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-22979", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-22979" }, { "cve": "CVE-2022-22969", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2022-22969" }, { "cve": "CVE-2020-5410", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2020-5410" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00.000+00:00", "title": "CVE-2020-15250" } ] }
wid-sec-w-2024-1652
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1652 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1652.json" }, { "category": "self", "summary": "WID-SEC-2024-1652 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1652" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle Supply Chain vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:29.832+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1652", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "21.0.2", "product": { "name": "Oracle Supply Chain 21.0.2", "product_id": "T020726", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2" } } }, { "category": "product_version_range", "name": "\u003c=6.2.1.9", "product": { "name": "Oracle Supply Chain \u003c=6.2.1.9", "product_id": "T036248" } }, { "category": "product_version_range", "name": "\u003c=6.2.1.7", "product": { "name": "Oracle Supply Chain \u003c=6.2.1.7", "product_id": "T036249" } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T020726" ], "last_affected": [ "T036249", "T036248" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T020726" ], "last_affected": [ "T036249", "T036248" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-37536", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T020726" ], "last_affected": [ "T036249", "T036248" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T020726" ], "last_affected": [ "T036249", "T036248" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T020726" ], "last_affected": [ "T036249", "T036248" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-46589" } ] }
wid-sec-w-2023-0553
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0553 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0553.json" }, { "category": "self", "summary": "WID-SEC-2023-0553 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0553" }, { "category": "external", "summary": "IBM Security Bulletin: 6959667 vom 2023-03-02", "url": "https://www.ibm.com/support/pages/node/6959667" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2023-03-02T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:46:04.222+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0553", "initial_release_date": "2023-03-02T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-02T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V22.0.2", "product": { "name": "IBM Business Automation Workflow \u003c V22.0.2", "product_id": "T026609", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v22.0.2" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V21.0.3.1", "product": { "name": "IBM Business Automation Workflow \u003c V21.0.3.1", "product_id": "T026610", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v21.0.3.1" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V20.0.0.2", "product": { "name": "IBM Business Automation Workflow \u003c V20.0.0.2", "product_id": "T026611", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v20.0.0.2" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Business Automation Workflow. In der Komponente \"Apache Xalan\" besteht ein Fehler bez\u00fcglich einer Integer Truncation. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-34169" } ] }
wid-sec-w-2024-0870
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0870 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0870.json" }, { "category": "self", "summary": "WID-SEC-2024-0870 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0870" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Communications Applications vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixCAGBU" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1797 vom 2024-04-22", "url": "https://access.redhat.com/errata/RHSA-2024:1797" } ], "source_lang": "en-US", "title": "Oracle Communications Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-22T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:07:40.529+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0870", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7.4.1", "product": { "name": "Oracle Communications Applications 7.4.1", "product_id": "T018939", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.1" } } }, { "category": "product_version", "name": "7.4.2", "product": { "name": "Oracle Communications Applications 7.4.2", "product_id": "T018940", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.2" } } }, { "category": "product_version_range", "name": "\u003c=12.0.0.8", "product": { "name": "Oracle Communications Applications \u003c=12.0.0.8", "product_id": "T034251" } }, { "category": "product_version", "name": "15.0.0.0", "product": { "name": "Oracle Communications Applications 15.0.0.0", "product_id": "T034252", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:15.0.0.0" } } }, { "category": "product_version", "name": "7.3.6.4", "product": { "name": "Oracle Communications Applications 7.3.6.4", "product_id": "T034253", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.3.6.4" } } }, { "category": "product_version_range", "name": "\u003c=7.4.2", "product": { "name": "Oracle Communications Applications \u003c=7.4.2", "product_id": "T034254" } }, { "category": "product_version", "name": "7.5.0", "product": { "name": "Oracle Communications Applications 7.5.0", "product_id": "T034255", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.5.0" } } }, { "category": "product_version", "name": "7.5.1", "product": { "name": "Oracle Communications Applications 7.5.1", "product_id": "T034256", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.5.1" } } }, { "category": "product_version", "name": "8.0.0.1.0", "product": { "name": "Oracle Communications Applications 8.0.0.1.0", "product_id": "T034257", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:8.0.0.1.0" } } } ], "category": "product_name", "name": "Communications Applications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-34381", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-34381" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-34053", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-34053" }, { "cve": "CVE-2023-34055", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-4043", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-4043" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-47100", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-47100" }, { "cve": "CVE-2023-6378", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-6378" }, { "cve": "CVE-2024-21634", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21634" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-26308" } ] }
wid-sec-w-2024-0899
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0899 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0899.json" }, { "category": "self", "summary": "WID-SEC-2024-0899 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0899" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Fusion Middleware vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixFMW" }, { "category": "external", "summary": "PoC CVE-2024-21006 vom 2025-06-09", "url": "https://github.com/d3fudd/CVE-2024-21006_POC" } ], "source_lang": "en-US", "title": "Oracle Fusion Middleware: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-09T22:00:00.000+00:00", "generator": { "date": "2025-06-10T06:12:15.168+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2024-0899", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-06-09T22:00:00.000+00:00", "number": "2", "summary": "PoC f\u00fcr CVE-2024-21006 aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.2.1.3.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.3.0", "product_id": "618028", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.3.0" } } }, { "category": "product_version", "name": "12.2.1.4.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.4.0", "product_id": "751674", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0" } } }, { "category": "product_version", "name": "14.1.1.0.0", "product": { "name": "Oracle Fusion Middleware 14.1.1.0.0", "product_id": "829576", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0" } } }, { "category": "product_version", "name": "8.5.6", "product": { "name": "Oracle Fusion Middleware 8.5.6", "product_id": "T024993", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.6" } } }, { "category": "product_version", "name": "8.5.7", "product": { "name": "Oracle Fusion Middleware 8.5.7", "product_id": "T034057", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.7" } } } ], "category": "product_name", "name": "Fusion Middleware" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0231", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2019-0231" }, { "cve": "CVE-2019-10172", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-13990", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2019-13990" }, { "cve": "CVE-2021-23369", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2021-23369" }, { "cve": "CVE-2022-1471", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-24329", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-25147", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-34169", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-34381", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-34381" }, { "cve": "CVE-2022-42003", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-45378", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-45378" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-46337" }, { "cve": "CVE-2022-48579", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-48579" }, { "cve": "CVE-2023-24021", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-24021" }, { "cve": "CVE-2023-2976", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-31122", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-31122" }, { "cve": "CVE-2023-33201", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-35116", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-35887", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-35887" }, { "cve": "CVE-2023-3635", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-37536", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46218", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46589", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-5072", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-52428", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-52428" }, { "cve": "CVE-2024-1597", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-1597" }, { "cve": "CVE-2024-20991", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-20991" }, { "cve": "CVE-2024-20992", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-20992" }, { "cve": "CVE-2024-21006", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21006" }, { "cve": "CVE-2024-21007", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21007" }, { "cve": "CVE-2024-21117", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21117" }, { "cve": "CVE-2024-21118", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21118" }, { "cve": "CVE-2024-21119", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21119" }, { "cve": "CVE-2024-21120", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21120" }, { "cve": "CVE-2024-23635", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-23635" }, { "cve": "CVE-2024-26308", "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-26308" } ] }
wid-sec-w-2024-0890
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0890 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0890.json" }, { "category": "self", "summary": "WID-SEC-2024-0890 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0890" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Supply Chain vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:07:45.716+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0890", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_version", "name": "6.2.4.2", "product": { "name": "Oracle Supply Chain 6.2.4.2", "product_id": "T032129", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.2.4.2" } } }, { "category": "product_version", "name": "6.5.2", "product": { "name": "Oracle Supply Chain 6.5.2", "product_id": "T034190", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.5.2" } } }, { "category": "product_version", "name": "6.5.3", "product": { "name": "Oracle Supply Chain 6.5.3", "product_id": "T034191", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.5.3" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-42503", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-42503" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2023-46589" }, { "cve": "CVE-2024-21091", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21091" }, { "cve": "CVE-2024-21092", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00.000+00:00", "title": "CVE-2024-21092" } ] }
wid-sec-w-2023-1017
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1017 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1017.json" }, { "category": "self", "summary": "WID-SEC-2023-1017 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1017" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Financial Services Applications vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:49:16.791+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1017", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 2.7.1", "product": { "name": "Oracle Financial Services Applications 2.7.1", "product_id": "T018979", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.7", "product": { "name": "Oracle Financial Services Applications 11.7", "product_id": "T020695", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.8", "product": { "name": "Oracle Financial Services Applications 11.8", "product_id": "T020696", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.10", "product": { "name": "Oracle Financial Services Applications 11.10", "product_id": "T020698", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.10" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.3", "product": { "name": "Oracle Financial Services Applications 18.3", "product_id": "T021669", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1", "product": { "name": "Oracle Financial Services Applications 19.1", "product_id": "T021670", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.2", "product": { "name": "Oracle Financial Services Applications 19.2", "product_id": "T021671", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1", "product": { "name": "Oracle Financial Services Applications 21.1", "product_id": "T021673", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.1.0", "product_id": "T022833", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.0", "product": { "name": "Oracle Financial Services Applications 8.1.2.0", "product_id": "T022834", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.9.0", "product": { "name": "Oracle Financial Services Applications 8.0.9.0", "product_id": "T022840", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.9.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.0", "product": { "name": "Oracle Financial Services Applications 8.0.8.0", "product_id": "T022841", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0.0", "product": { "name": "Oracle Financial Services Applications 8.1.0.0", "product_id": "T023923", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.1", "product_id": "T023924", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.0", "product": { "name": "Oracle Financial Services Applications 8.0.7.0", "product_id": "T023925", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.7", "product": { "name": "Oracle Financial Services Applications 2.7", "product_id": "T023927", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9", "product": { "name": "Oracle Financial Services Applications 2.9", "product_id": "T023928", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.2", "product": { "name": "Oracle Financial Services Applications 8.1.2.2", "product_id": "T024988", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.3.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.3.1", "product_id": "T025878", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7", "product_id": "T027348", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1", "product": { "name": "Oracle Financial Services Applications 22.1", "product_id": "T027349", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2", "product": { "name": "Oracle Financial Services Applications 22.2", "product_id": "T027350", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4", "product": { "name": "Oracle Financial Services Applications 8.1.2.4", "product_id": "T027351", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.3", "product": { "name": "Oracle Financial Services Applications 8.1.2.3", "product_id": "T027352", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.8", "product": { "name": "Oracle Financial Services Applications 2.8", "product_id": "T027353", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.2", "product": { "name": "Oracle Financial Services Applications 18.2", "product_id": "T027354", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.4.1", "product_id": "T027358", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.1", "product": { "name": "Oracle Financial Services Applications 2.9.1", "product_id": "T027359", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.0", "product": { "name": "Oracle Financial Services Applications 3.0", "product_id": "T027360", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.1", "product": { "name": "Oracle Financial Services Applications 3.1", "product_id": "T027361", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.2", "product": { "name": "Oracle Financial Services Applications 3.2", "product_id": "T027362", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 4.0", "product": { "name": "Oracle Financial Services Applications 4.0", "product_id": "T027363", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:4.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.0.0", "product": { "name": "Oracle Financial Services Applications 8.0.8.0.0", "product_id": "T027364", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.6", "product": { "name": "Oracle Financial Services Applications 11.6", "product_id": "T027365", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.11", "product": { "name": "Oracle Financial Services Applications 11.11", "product_id": "T027366", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.11" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.1.2", "product": { "name": "Oracle Financial Services Applications 8.0.7.1.2", "product_id": "T027367", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1.7", "product": { "name": "Oracle Financial Services Applications 8.1.1.1.7", "product_id": "T027368", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.8.0", "product": { "name": "Oracle Financial Services Applications 8.0.7.8.0", "product_id": "T027369", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1.1", "product_id": "T027370", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1.4", "product": { "name": "Oracle Financial Services Applications 8.0.8.1.4", "product_id": "T027371", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0.1.4", "product": { "name": "Oracle Financial Services Applications 8.1.0.1.4", "product_id": "T027372", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0.1.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.2.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.2.1", "product_id": "T027373", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.3.1", "product": { "name": "Oracle Financial Services Applications 8.0.7.3.1", "product_id": "T027374", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.7.8.1", "product_id": "T027375", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.2.1", "product_id": "T027376", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.2.0", "product": { "name": "Oracle Financial Services Applications 8.1.1.2.0", "product_id": "T027377", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.3.5", "product": { "name": "Oracle Financial Services Applications 8.0.8.3.5", "product_id": "T027378", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.3.5" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-25194", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-25194" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-21915", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21915" }, { "cve": "CVE-2023-21908", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21908" }, { "cve": "CVE-2023-21907", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21907" }, { "cve": "CVE-2023-21906", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21906" }, { "cve": "CVE-2023-21905", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21905" }, { "cve": "CVE-2023-21904", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21904" }, { "cve": "CVE-2023-21903", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21903" }, { "cve": "CVE-2023-21902", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21902" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-29577", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-29577" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22979", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-22979" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2021-43859", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2021-43859" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-36090", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2021-36090" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2020-11988", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2020-11988" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2019-12415" } ] }
wid-sec-w-2023-1032
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle PeopleSoft ist eine ERP Anwendung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1032 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1032.json" }, { "category": "self", "summary": "WID-SEC-2023-1032 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1032" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle PeopleSoft vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixPS" } ], "source_lang": "en-US", "title": "Oracle PeopleSoft: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:49:32.637+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1032", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle PeopleSoft 8.58", "product": { "name": "Oracle PeopleSoft 8.58", "product_id": "T019029", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.58" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 9.2", "product": { "name": "Oracle PeopleSoft 9.2", "product_id": "T019030", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:9.2" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.59", "product": { "name": "Oracle PeopleSoft 8.59", "product_id": "T019905", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.59" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.60", "product": { "name": "Oracle PeopleSoft 8.60", "product_id": "T025008", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.60" } } } ], "category": "product_name", "name": "PeopleSoft" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21992", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21992" }, { "cve": "CVE-2023-21981", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21981" }, { "cve": "CVE-2023-21916", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2023-21916" }, { "cve": "CVE-2022-45685", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-45685" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2020-14343", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00.000+00:00", "title": "CVE-2020-14343" } ] }
gsd-2022-34169
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-34169", "description": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "id": "GSD-2022-34169", "references": [ "https://www.debian.org/security/2022/dsa-5188", "https://www.debian.org/security/2022/dsa-5192", "https://access.redhat.com/errata/RHSA-2022:5681", "https://access.redhat.com/errata/RHSA-2022:5683", "https://access.redhat.com/errata/RHSA-2022:5684", "https://access.redhat.com/errata/RHSA-2022:5685", "https://access.redhat.com/errata/RHSA-2022:5687", "https://access.redhat.com/errata/RHSA-2022:5695", "https://access.redhat.com/errata/RHSA-2022:5696", "https://access.redhat.com/errata/RHSA-2022:5697", "https://access.redhat.com/errata/RHSA-2022:5698", "https://access.redhat.com/errata/RHSA-2022:5700", "https://access.redhat.com/errata/RHSA-2022:5701", "https://access.redhat.com/errata/RHSA-2022:5709", "https://access.redhat.com/errata/RHSA-2022:5726", "https://access.redhat.com/errata/RHSA-2022:5736", "https://access.redhat.com/errata/RHSA-2022:5753", "https://access.redhat.com/errata/RHSA-2022:5754", "https://www.suse.com/security/cve/CVE-2022-34169.html", "https://access.redhat.com/errata/RHSA-2022:5755", "https://access.redhat.com/errata/RHSA-2022:5756", "https://access.redhat.com/errata/RHSA-2022:5757", "https://access.redhat.com/errata/RHSA-2022:5758", "https://ubuntu.com/security/CVE-2022-34169", "https://alas.aws.amazon.com/cve/html/CVE-2022-34169.html", "https://www.debian.org/security/2022/dsa-5256", "https://advisories.mageia.org/CVE-2022-34169.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-34169" ], "details": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "id": "GSD-2022-34169", "modified": "2023-12-13T01:19:18.908040Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-34169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Xalan-J", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Xalan-J", "version_value": "2.7.2" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credits": [ { "lang": "en", "value": "Reported by Felix Wilhelm, Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "integer truncation" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8", "refsource": "MISC", "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "name": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw", "refsource": "MISC", "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/19/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/19/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/20/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/20/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "name": "https://www.debian.org/security/2022/dsa-5188", "refsource": "MISC", "url": "https://www.debian.org/security/2022/dsa-5188" }, { "name": "https://www.debian.org/security/2022/dsa-5192", "refsource": "MISC", "url": "https://www.debian.org/security/2022/dsa-5192" }, { "name": "https://security.netapp.com/advisory/ntap-20220729-0009/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "name": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "name": "http://www.openwall.com/lists/oss-security/2022/10/18/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "name": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "name": "https://www.debian.org/security/2022/dsa-5256", "refsource": "MISC", "url": "https://www.debian.org/security/2022/dsa-5256" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/04/8", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/07/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "name": "https://security.gentoo.org/glsa/202401-25", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202401-25" } ] }, "source": { "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.7.2]", "affected_versions": "All versions up to 2.7.2", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-937" ], "date": "2022-07-22", "description": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "fixed_versions": [], "identifier": "CVE-2022-34169", "identifiers": [ "GHSA-9339-86wc-4qgf", "CVE-2022-34169" ], "not_impacted": "", "package_slug": "maven/xalan/xalan", "pubdate": "2022-07-20", "solution": "Unfortunately, there is no solution available yet.", "title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw", "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8", "http://www.openwall.com/lists/oss-security/2022/07/19/5", "http://www.openwall.com/lists/oss-security/2022/07/19/6", "http://www.openwall.com/lists/oss-security/2022/07/20/2", "http://www.openwall.com/lists/oss-security/2022/07/20/3", "https://www.oracle.com/security-alerts/cpujul2022.html", "https://github.com/advisories/GHSA-9339-86wc-4qgf" ], "uuid": "24b8dd89-44e3-498a-8697-b83a13911bd6" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*", "matchCriteriaId": "E406791B-F9FD-4E3F-831C-296D8F8FF9BE", "versionEndIncluding": "2.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7D961E24-EA18-4217-B5F5-F847726D84E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "601D92C4-F71F-47E2-9041-5C286D2137F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B18FE85D-C53D-44E9-8992-715820D1264B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*", "matchCriteriaId": "6E3C0BA3-FCD3-4CB8-B8C7-F931090A7DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*", "matchCriteriaId": "EB2A5440-7FA7-4A86-AA19-E2ABBD809B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:11.0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C0485FC-E4B2-464E-8228-1387AC5F353B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7AF3539B-0434-4310-AE88-F46864C7C20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:18.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5CC9398-71B6-4480-95ED-EDCE838D157E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update343:*:*:*:*:*:*", "matchCriteriaId": "60614E43-090E-44D7-94AD-FFAE38FF111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update333:*:*:*:*:*:*", "matchCriteriaId": "131E1C9E-721C-4176-B78B-69C01F90A9A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:11.0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD4BFA12-588A-4D8D-B45F-648A55EC674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:18.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EF9CFB1-CEC9-483E-BECF-618190C03944", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD2ADA66-DCD0-4D28-80B2-77A0265CE7B9", "versionEndIncluding": "11.0.15", "versionStartIncluding": "11", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA6BC07-2BDA-4913-AF2B-FD2146B0E539", "versionEndIncluding": "13.0.11", "versionStartIncluding": "13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A2E366B-549D-48C5-B3FB-AD0E8C75AE08", "versionEndIncluding": "15.0.7", "versionStartIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "15FD6A0B-BB1A-4875-926C-AB1B6EC1A053", "versionEndIncluding": "17.0.3", "versionStartIncluding": "17", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", "matchCriteriaId": "E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", "matchCriteriaId": "02011EDC-20A7-4A16-A592-7C76E0037997", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", "matchCriteriaId": "AC6D4652-1226-4C60-BEDF-01EBF8AC0849", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", "matchCriteriaId": "3C1F9ED7-7D93-41F4-9130-15BA734420AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", "matchCriteriaId": "1CF9CDF1-95D3-4125-A73F-396D2280FC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", "matchCriteriaId": "A13266DC-F8D9-4F30-987F-65BBEAF8D3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", "matchCriteriaId": "C28388AB-CFC9-4749-A90F-383F5B905EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", "matchCriteriaId": "DA1B00F9-A81C-48B7-8DAA-F394DDF323F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", "matchCriteriaId": "CA7AD457-6CE6-4925-8D94-A907B40233D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", "matchCriteriaId": "A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", "matchCriteriaId": "5480E5AD-DB46-474A-9B57-84ED088A75FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", "matchCriteriaId": "881A4AE9-6012-4E91-98BE-0A352CC20703", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", "matchCriteriaId": "7E1E1079-57D9-473B-A017-964F4745F329", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", "matchCriteriaId": "B8D6446E-2915-4F12-87BE-E7420BC2626E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", "matchCriteriaId": "564EDCE3-16E6-401D-8A43-032D1F8875E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", "matchCriteriaId": "08278802-D31B-488A-BA6A-EBC816DF883A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", "matchCriteriaId": "72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", "matchCriteriaId": "7BBB0969-565E-43E2-B067-A10AAA5F1958", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", "matchCriteriaId": "D78BE95D-6270-469A-8035-FCDDB398F952", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", "matchCriteriaId": "88C24F40-3150-4584-93D9-8307DE04EEE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", "matchCriteriaId": "E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", "matchCriteriaId": "19626B36-62FC-4497-A2E1-7D6CD9839B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", "matchCriteriaId": "5713AEBD-35F6-44E8-A0CC-A42830D7AE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", "matchCriteriaId": "8BE0C04B-440E-4B35-ACC8-6264514F764C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", "matchCriteriaId": "555EC2A6-0475-48ED-AE0C-B306714A9333", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", "matchCriteriaId": "EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*", "matchCriteriaId": "02C55E2E-AEDE-455C-B128-168C918B5D97", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*", "matchCriteriaId": "81831D37-6597-441B-87DE-38F7191BEA42", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*", "matchCriteriaId": "EEA1594D-0AB5-436D-9E60-C26EE2175753", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*", "matchCriteriaId": "B868FA41-C71B-491C-880B-484740B30C72", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", "matchCriteriaId": "C242D3BE-9114-4A9E-BB78-45754C7CC450", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*", "matchCriteriaId": "95954182-9541-4181-9647-B17FA5A79F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*", "matchCriteriaId": "9F6F0137-F91F-4028-BED2-C29640D52C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*", "matchCriteriaId": "EAFB6B15-4AE6-47FC-8847-9DFADB7AE253", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", "matchCriteriaId": "D61068FE-18EE-4ADB-BC69-A3ECE8724575", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", "matchCriteriaId": "EFB59E80-4EC4-4399-BF40-6733E4E475A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", "matchCriteriaId": "84E31265-22E1-4E91-BFCB-D2AFF445926A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", "matchCriteriaId": "AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", "matchCriteriaId": "50319E52-8739-47C5-B61E-3CA9B6A9A48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", "matchCriteriaId": "7ED515B9-DC74-4DC5-B98A-08D87D85E11E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", "matchCriteriaId": "6D1D4868-1F9F-43F7-968C-6469B67D3F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", "matchCriteriaId": "568F1AC4-B0D7-4438-82E5-0E61500F2240", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", "matchCriteriaId": "F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", "matchCriteriaId": "14E9133E-9FF3-40DB-9A11-7469EF5FD265", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", "matchCriteriaId": "94834710-3FA9-49D9-8600-B514CBCA4270", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", "matchCriteriaId": "4228D9E1-7D82-4B49-9669-9CDAD7187432", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", "matchCriteriaId": "F6231F48-2936-4F7D-96D5-4BA11F78EBE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", "matchCriteriaId": "D96D5061-4A81-497E-9AD6-A8381B3B454C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", "matchCriteriaId": "5345C21E-A01B-43B9-9A20-F2783D921C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", "matchCriteriaId": "B219F360-83BD-4111-AB59-C9D4F55AF4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", "matchCriteriaId": "D25377EA-8E8F-4C76-8EA9-3BBDFB352815", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", "matchCriteriaId": "59FEFE05-269A-4EAF-A80F-E4C2107B1197", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", "matchCriteriaId": "E7E2AA7C-F602-4DB7-9EC1-0708C46C253C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", "matchCriteriaId": "FB70E154-A304-429E-80F5-8D87B00E32D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "matchCriteriaId": "70892D06-6E75-4425-BBF0-4B684EC62A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", "matchCriteriaId": "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", "matchCriteriaId": "7417B2BB-9AC2-4AF4-A828-C89A0735AD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", "matchCriteriaId": "6A0A57B5-6F88-4288-9CDE-F6613FE068D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", "matchCriteriaId": "67ED8559-C348-4932-B7CE-CB96976A30EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", "matchCriteriaId": "40AC3D91-263F-4345-9FAA-0E573EA64590", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", "matchCriteriaId": "DD92AFA9-81F8-48D4-B79A-E7F066F69A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", "matchCriteriaId": "2C4B2F24-A730-4818-90C8-A2D90C081F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", "matchCriteriaId": "464087F2-C285-4574-957E-CE0663F07DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", "matchCriteriaId": "3E9BB880-A4F6-4887-8BB9-47AA298753D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "matchCriteriaId": "18DCFF53-B298-4534-AB5C-8A5EF59C616F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "matchCriteriaId": "083419F8-FDDF-4E36-88F8-857DB317C1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "matchCriteriaId": "D7A74F65-57E8-4C9A-BA96-5EF401504F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "matchCriteriaId": "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "matchCriteriaId": "07812576-3C35-404C-A7D7-9BE9E3D76E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "matchCriteriaId": "00C52B1C-5447-4282-9667-9EBE0720B423", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "matchCriteriaId": "92BB9EB0-0C12-4E77-89EE-FB77097841B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "matchCriteriaId": "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "matchCriteriaId": "ABC0E7BB-F8B7-4369-9910-71240E4073A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "matchCriteriaId": "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "matchCriteriaId": "0AE30779-48FB-451E-8CE1-F469F93B8772", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "matchCriteriaId": "60590FDE-7156-4314-A012-AA38BD2ADDC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "matchCriteriaId": "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "matchCriteriaId": "F24F6122-2256-41B6-9033-794C6424ED99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "matchCriteriaId": "0EAFA79E-8C7A-48CF-8868-11378FE4B26F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "matchCriteriaId": "D1D6F19F-59B5-4BB6-AD35-013384025970", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "matchCriteriaId": "E7BA97BC-3ADA-465A-835B-6C3C5F416B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "matchCriteriaId": "B71F77A4-B7EB-47A1-AAFD-431A7D040B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "matchCriteriaId": "91D6BEA9-5943-44A4-946D-CEAA9BA99376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "matchCriteriaId": "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "matchCriteriaId": "2CB74086-14B8-4237-8357-E0C6B5BB8313", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "matchCriteriaId": "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "matchCriteriaId": "00C2B9C9-1177-4DA6-96CE-55F37F383F99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", "matchCriteriaId": "435CF189-0BD8-40DF-A0DC-99862CDEAF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "matchCriteriaId": "12A3F367-33AD-47C3-BFDC-871A17E72C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", "matchCriteriaId": "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "matchCriteriaId": "78261932-7373-4F16-91E0-1A72ADBEBC3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", "matchCriteriaId": "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "matchCriteriaId": "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", "matchCriteriaId": "F5A40B8A-D428-4008-9F21-AF21394C51D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", "matchCriteriaId": "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", "matchCriteriaId": "3B504718-5DCE-43B4-B19A-C6B6E7444BD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", "matchCriteriaId": "3102AA10-99A8-49A9-867E-7EEC56865680", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", "matchCriteriaId": "5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*", "matchCriteriaId": "15BA8A26-2CDA-442B-A549-6BE92DCCD205", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*", "matchCriteriaId": "56F2883B-6A1B-4081-8877-07AF3A73F6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*", "matchCriteriaId": "98C0742E-ACDD-4DB4-8A4C-B96702C8976C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", "matchCriteriaId": "F8483034-DD5A-445D-892F-CDE90A7D58EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*", "matchCriteriaId": "1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*", "matchCriteriaId": "DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*", "matchCriteriaId": "A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", "matchCriteriaId": "8279718F-878F-4868-8859-1728D13CD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", "matchCriteriaId": "2C024E1A-FD2C-42E8-B227-C2AFD3040436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", "matchCriteriaId": "4F24389D-DDD0-4204-AA24-31C920A4F47E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", "matchCriteriaId": "966979BE-1F21-4729-B6B8-610F74648344", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", "matchCriteriaId": "F8534265-33BF-460D-BF74-5F55FDE50F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", "matchCriteriaId": "F77AFC25-1466-4E56-9D5F-6988F3288E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", "matchCriteriaId": "A650BEB8-E56F-4E42-9361-8D2DB083F0F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", "matchCriteriaId": "799FFECD-E80A-44B3-953D-CDB5E195F3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", "matchCriteriaId": "A7047507-7CAF-4A14-AA9A-5CEF806EDE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", "matchCriteriaId": "CFC7B179-95D3-4F94-84F6-73F1034A1AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", "matchCriteriaId": "9FB28526-9385-44CA-AF08-1899E6C3AE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", "matchCriteriaId": "E26B69E4-0B43-415F-A82B-52FDCB262B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", "matchCriteriaId": "27BC4150-70EC-462B-8FC5-20B3442CBB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", "matchCriteriaId": "02646989-ECD9-40AE-A83E-EFF4080C69B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:18:*:*:*:*:*:*:*", "matchCriteriaId": "56CBFC1F-C120-44F2-877A-C1C880AA89C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF6650C-558D-45C8-AE7D-136EE70CB6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*", "matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*", "matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*", "matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*", "matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*", "matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." }, { "lang": "es", "value": "La biblioteca Apache Xalan Java XSLT es vulnerable a un problema de truncamiento de enteros cuando procesa hojas de estilo XSLT maliciosas. Esto puede usarse para corromper los archivos de clase Java generados por el compilador interno XSLTC y ejecutar c\u00f3digo de bytes Java arbitrario. El proyecto Apache Xalan Java est\u00e1 inactivo y en proceso de ser retirado. No son esperadas futuras versiones de Apache Xalan Java que abordan este problema. Nota: Los tiempos de ejecuci\u00f3n de Java (como OpenJDK) incluyen copias reempaquetadas de Xalan." } ], "id": "CVE-2022-34169", "lastModified": "2024-01-17T15:15:09.640", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-19T18:15:11.740", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "source": "security@apache.org", "url": "https://security.gentoo.org/glsa/202401-25" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-681" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
suse-su-2022:2660-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-17-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-17-openjdk fixes the following issues:\n\nUpdate to upstream tag jdk-17.0.4+8 (July 2022 CPU)\n\n- CVE-2022-21540: Improve class compilation (bsc#1201694)\n- CVE-2022-21541: Enhance MethodHandle invocations (bsc#1201692)\n- CVE-2022-34169: Improve Xalan supports (bsc#1201684)\n- CVE-2022-21549: java.util.random does not correctly sample exponential or Gaussian distributions (bsc#1201685)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2660,SUSE-SLE-Module-Basesystem-15-SP4-2022-2660,openSUSE-SLE-15.4-2022-2660", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2660-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2660-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222660-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2660-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201685", "url": "https://bugzilla.suse.com/1201685" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-17-openjdk", "tracking": { "current_release_date": "2022-08-03T19:06:16Z", "generator": { "date": "2022-08-03T19:06:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2660-1", "initial_release_date": "2022-08-03T19:06:16Z", "revision_history": [ { "date": "2022-08-03T19:06:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "product": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "product_id": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-17.0.4.0-150400.3.3.1.i586" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.i586" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.i586" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.i586" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.i586" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.i586" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.i586", "product": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.i586", "product_id": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "product": { "name": "java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "product_id": "java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "product": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "product_id": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "product": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "product_id": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64", "product": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64", "product_id": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch" }, "product_reference": "java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64" }, "product_reference": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le" }, "product_reference": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x" }, "product_reference": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" }, "product_reference": "java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-03T19:06:16Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-03T19:06:16Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-03T19:06:16Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-accessibility-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-demo-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-devel-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-headless-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-javadoc-17.0.4.0-150400.3.3.1.noarch", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-jmods-17.0.4.0-150400.3.3.1.x86_64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.aarch64", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.ppc64le", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.s390x", "openSUSE Leap 15.4:java-17-openjdk-src-17.0.4.0-150400.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-03T19:06:16Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-ru-2024:3971-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for mojo-parent", "title": "Title of the patch" }, { "category": "description", "text": "This update for mojo-parent fixes the following issues:\n\nxalan-j2 was updated from version 2.7.2 to 2.7.3:\n\n- Security issues fixed:\n\n * CVE-2022-34169: Fixed integer truncation issue when processing malicious XSLT stylesheets (bsc#1201684)\n\n- Changes and Bugs fixed:\n\n * Java 8 is now the minimum requirement\n * Upgraded to Apache Commons BCEL 6.7.0\n * Upgraded to Xerces-J 2.12.2\n\nmojo-parent was updated from version 70 to 82:\n\n- Main changes:\n\n * Potentially Breaking Changes:\n\n + mojo.java.target should be set as \u00278\u0027, without \u00271.\u0027\n + spotless plugin must be executed by JDK 11 at least\n + ossrh-snapshots repository was removed from parent\n\n * New features and improvements:\n\n + Removed SHA-512 checksum for source release artifact\n + Use only project version as tag for release\n + Added space before close empty elements in poms by spotless\n + Using Checkstyle together with Spotless\n + Introduce spotless for automatic code formatting\n + Introduce enforcer rule for minimal version of Java and Maven\n + Use new Plugin Tools report - maven-plugin-report-plugin\n + Added sisu-maven-plugin\n + Introduced maven.version property\n + Execute spotless by JDK 11 at least\n + Use release options for m-compiler-p with newer JDKs\n + Allow override of invoker.streamLogsOnFailures\n + Require Maven 3.9.x at least for releases\n + Added maven-wrapper-plugin to pluginManagement\n + Removed ossrh-snapshots repository from MojoHaus parent\n + Added build-helper-maven-plugin to pluginManagement\n + Require Maven 3.6.3+\n + Updated palantirJavaFormat for spotless - JDK 21 compatible\n + Added dependencyManagement for maven-shade-plugin\n + Dropped recommendedJavaBuildVersion property\n + Format Markdown files with Spotless Plugin\n\n * Bugs fixed:\n\n + Restore source release distribution in child projects\n + Rename property maven.version to mavenVersion\n + minimalMavenBuildVersion should not be overriding by\n mavenVersion\n + Use simple checkstyle rules since spotless is executed by\n default\n + Use old spotless version only for JDK \u003c 11\n + Fixed spotless configuration for markdown\n\n- Other changes:\n\n * Removed Google search box due to privacy\n * Put version for mrm-maven-plugin in property\n * Added streamLogsOnFailures to m-invoker-p\n * Added property for maven-fluido-skin version\n * Setup Apache Matomo analytics\n * Require Maven 3.2.5\n * Added SHA-512 hashes\n * Extract plugin version as variable so child pom can override if needed\n * Removed issue-tracking as no longer exists\n * Removed cim report as no longer exists\n\nbcel was updated from version 5.2 to 6.10:\n \n- Many APIs have been extended\n- Added riscv64 support\n- Various bugs were fixed\n\napache-commons-lang3 was updated to version 3.12.0 to 3.16.0:\n\n- Included new APIs that are needed by bcel 6.x\n- Various minor bugs were fixed\n\nxerces-j2:\n\n- Improved RPM packaging build instructions\n\nnetty3:\n\n- Generate sources with protobuf instead of using pre-generated ones\n \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3971,SUSE-SLE-Module-Basesystem-15-SP5-2024-3971,SUSE-SLE-Module-Basesystem-15-SP6-2024-3971,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3971,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3971,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-3971,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3971,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3971,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3971,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3971,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3971,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3971,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3971,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3971,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3971,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3971,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3971,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3971,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3971,SUSE-Storage-7.1-2024-3971,openSUSE-SLE-15.5-2024-3971,openSUSE-SLE-15.6-2024-3971", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2024_3971-1.json" }, { "category": "self", "summary": "URL for SUSE-RU-2024:3971-1", "url": "https://www.suse.com/support/update/announcement//suse-ru-20243971-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-RU-2024:3971-1", "url": "https://lists.suse.com/pipermail/sle-updates/2024-November/037527.html" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Recommended update for mojo-parent", "tracking": { "current_release_date": "2024-11-11T09:29:10Z", "generator": { "date": "2024-11-11T09:29:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-RU-2024:3971-1", "initial_release_date": "2024-11-11T09:29:10Z", "revision_history": [ { "date": "2024-11-11T09:29:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "product": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "product_id": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch" } }, { "category": "product_version", "name": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "product": { "name": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "product_id": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch" } }, { "category": "product_version", "name": "bcel-6.10.0-150200.11.6.2.noarch", "product": { "name": "bcel-6.10.0-150200.11.6.2.noarch", "product_id": "bcel-6.10.0-150200.11.6.2.noarch" } }, { "category": "product_version", "name": "bcel-javadoc-6.10.0-150200.11.6.2.noarch", "product": { "name": "bcel-javadoc-6.10.0-150200.11.6.2.noarch", "product_id": "bcel-javadoc-6.10.0-150200.11.6.2.noarch" } }, { "category": "product_version", "name": "mojo-parent-82-150200.3.10.1.noarch", "product": { "name": "mojo-parent-82-150200.3.10.1.noarch", "product_id": "mojo-parent-82-150200.3.10.1.noarch" } }, { "category": "product_version", "name": "netty3-3.10.6-150200.3.13.2.noarch", "product": { "name": "netty3-3.10.6-150200.3.13.2.noarch", "product_id": "netty3-3.10.6-150200.3.13.2.noarch" } }, { "category": "product_version", "name": "netty3-javadoc-3.10.6-150200.3.13.2.noarch", "product": { "name": "netty3-javadoc-3.10.6-150200.3.13.2.noarch", "product_id": "netty3-javadoc-3.10.6-150200.3.13.2.noarch" } }, { "category": "product_version", "name": "xalan-j2-2.7.3-150200.11.7.1.noarch", "product": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch", "product_id": "xalan-j2-2.7.3-150200.11.7.1.noarch" } }, { "category": "product_version", "name": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "product": { "name": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "product_id": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch" } }, { "category": "product_version", "name": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "product": { "name": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "product_id": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch" } }, { "category": "product_version", "name": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "product": { "name": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "product_id": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch" } }, { "category": "product_version", "name": "xerces-j2-2.12.2-150200.3.10.2.noarch", "product": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch", "product_id": "xerces-j2-2.12.2-150200.3.10.2.noarch" } }, { "category": "product_version", "name": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "product": { "name": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "product_id": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch" } }, { "category": "product_version", "name": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "product": { "name": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "product_id": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch" } }, { "category": "product_version", "name": "xml-stylebook-1.0~b3_xalan2-150200.5.3.2.noarch", "product": { "name": "xml-stylebook-1.0~b3_xalan2-150200.5.3.2.noarch", "product_id": "xml-stylebook-1.0~b3_xalan2-150200.5.3.2.noarch" } }, { "category": "product_version", "name": "xml-stylebook-demo-1.0~b3_xalan2-150200.5.3.2.noarch", "product": { "name": "xml-stylebook-demo-1.0~b3_xalan2-150200.5.3.2.noarch", "product_id": "xml-stylebook-demo-1.0~b3_xalan2-150200.5.3.2.noarch" } }, { "category": "product_version", "name": "xml-stylebook-javadoc-1.0~b3_xalan2-150200.5.3.2.noarch", "product": { "name": "xml-stylebook-javadoc-1.0~b3_xalan2-150200.5.3.2.noarch", "product_id": "xml-stylebook-javadoc-1.0~b3_xalan2-150200.5.3.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Manager Server Module 4.3", "product": { "name": "SUSE Manager Server Module 4.3", "product_id": "SUSE Manager Server Module 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Manager Server Module 4.3", "product_id": "SUSE Manager Server Module 4.3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Manager Server Module 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "mojo-parent-82-150200.3.10.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:mojo-parent-82-150200.3.10.1.noarch" }, "product_reference": "mojo-parent-82-150200.3.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-javadoc-3.10.6-150200.3.13.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:netty3-javadoc-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-javadoc-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xalan-j2-demo-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xalan-j2-manual-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xerces-j2-demo-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch" }, "product_reference": "apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "bcel-6.10.0-150200.11.6.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:bcel-6.10.0-150200.11.6.2.noarch" }, "product_reference": "bcel-6.10.0-150200.11.6.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "mojo-parent-82-150200.3.10.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:mojo-parent-82-150200.3.10.1.noarch" }, "product_reference": "mojo-parent-82-150200.3.10.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-3.10.6-150200.3.13.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:netty3-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "netty3-javadoc-3.10.6-150200.3.13.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:netty3-javadoc-3.10.6-150200.3.13.2.noarch" }, "product_reference": "netty3-javadoc-3.10.6-150200.3.13.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xalan-j2-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xalan-j2-demo-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xalan-j2-manual-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch" }, "product_reference": "xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-2.12.2-150200.3.10.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xerces-j2-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xerces-j2-demo-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch" }, "product_reference": "xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Enterprise Storage 7.1:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Enterprise Storage 7.1:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Enterprise Storage 7.1:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Enterprise Storage 7.1:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP6:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Proxy 4.3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Manager Proxy 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Manager Proxy 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Server 4.3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Manager Server 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Manager Server 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Server Module 4.3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:bcel-6.10.0-150200.11.6.2.noarch", "openSUSE Leap 15.5:mojo-parent-82-150200.3.10.1.noarch", "openSUSE Leap 15.5:netty3-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.5:netty3-javadoc-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.5:xalan-j2-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xerces-j2-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.5:xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.5:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.6:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.6:bcel-6.10.0-150200.11.6.2.noarch", "openSUSE Leap 15.6:mojo-parent-82-150200.3.10.1.noarch", "openSUSE Leap 15.6:netty3-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.6:netty3-javadoc-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.6:xalan-j2-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xerces-j2-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Enterprise Storage 7.1:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Enterprise Storage 7.1:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Enterprise Storage 7.1:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Enterprise Storage 7.1:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP6:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Proxy 4.3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Manager Proxy 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Manager Proxy 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Server 4.3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Manager Server 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Manager Server 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Server Module 4.3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:bcel-6.10.0-150200.11.6.2.noarch", "openSUSE Leap 15.5:mojo-parent-82-150200.3.10.1.noarch", "openSUSE Leap 15.5:netty3-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.5:netty3-javadoc-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.5:xalan-j2-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xerces-j2-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.5:xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.5:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.6:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.6:bcel-6.10.0-150200.11.6.2.noarch", "openSUSE Leap 15.6:mojo-parent-82-150200.3.10.1.noarch", "openSUSE Leap 15.6:netty3-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.6:netty3-javadoc-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.6:xalan-j2-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xerces-j2-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Enterprise Storage 7.1:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Enterprise Storage 7.1:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Enterprise Storage 7.1:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Enterprise Storage 7.1:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP6:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:netty3-3.10.6-150200.3.13.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Proxy 4.3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Manager Proxy 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Manager Proxy 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Server 4.3:bcel-6.10.0-150200.11.6.2.noarch", "SUSE Manager Server 4.3:xalan-j2-2.7.3-150200.11.7.1.noarch", "SUSE Manager Server 4.3:xerces-j2-2.12.2-150200.3.10.2.noarch", "SUSE Manager Server Module 4.3:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.5:bcel-6.10.0-150200.11.6.2.noarch", "openSUSE Leap 15.5:mojo-parent-82-150200.3.10.1.noarch", "openSUSE Leap 15.5:netty3-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.5:netty3-javadoc-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.5:xalan-j2-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.5:xerces-j2-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.5:xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.5:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:apache-commons-lang3-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.6:apache-commons-lang3-javadoc-3.16.0-150200.3.9.2.noarch", "openSUSE Leap 15.6:bcel-6.10.0-150200.11.6.2.noarch", "openSUSE Leap 15.6:mojo-parent-82-150200.3.10.1.noarch", "openSUSE Leap 15.6:netty3-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.6:netty3-javadoc-3.10.6-150200.3.13.2.noarch", "openSUSE Leap 15.6:xalan-j2-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-demo-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-manual-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xalan-j2-xsltc-2.7.3-150200.11.7.1.noarch", "openSUSE Leap 15.6:xerces-j2-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:xerces-j2-demo-2.12.2-150200.3.10.2.noarch", "openSUSE Leap 15.6:xerces-j2-javadoc-2.12.2-150200.3.10.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-11T09:29:10Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:3152-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\nNote: the issues listed below were NOT fixed with the previous update (8.0-7.11).\n\n- Update to Java 8.0 Service Refresh 7 Fix Pack 15 (bsc#1202427):\n - CVE-2022-34169: Fixed an integer truncation issue in the Xalan\n Java XSLT library that occurred when processing malicious\n stylesheets (bsc#1201684).\n - CVE-2022-21549: Fixed an issue that could lead to computing\n negative random exponentials (bsc#1201685).\n - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201692).\n - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201694)..\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-3152,SUSE-OpenStack-Cloud-9-2022-3152,SUSE-OpenStack-Cloud-Crowbar-9-2022-3152,SUSE-SLE-SAP-12-SP4-2022-3152,SUSE-SLE-SDK-12-SP5-2022-3152,SUSE-SLE-SERVER-12-SP2-BCL-2022-3152,SUSE-SLE-SERVER-12-SP3-BCL-2022-3152,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3152,SUSE-SLE-SERVER-12-SP5-2022-3152", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3152-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:3152-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223152-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:3152-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201685", "url": "https://bugzilla.suse.com/1201685" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE Bug 1202427", "url": "https://bugzilla.suse.com/1202427" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2022-09-07T12:19:55Z", "generator": { "date": "2022-09-07T12:19:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:3152-1", "initial_release_date": "2022-09-07T12:19:55Z", "revision_history": [ { "date": "2022-09-07T12:19:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390", "product_id": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.s390", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.s390", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.s390", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.s390", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.15-30.96.1.s390x", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.15-30.96.1.s390x", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr7.15-30.96.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.15-30.96.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.15-30.96.1.s390x", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.15-30.96.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.15-30.96.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-07T12:19:55Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-07T12:19:55Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-07T12:19:55Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.15-30.96.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.15-30.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-07T12:19:55Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:2898-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_1-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_1-ibm fixes the following issues:\n\n- Updated to Java 7.1 Service Refresh 5 Fix Pack 15 (bsc#1202427):\n - CVE-2022-34169: Fixed an integer truncation issue in the Xalan\n Java XSLT library that occurred when processing malicious\n stylesheets (bsc#1201684).\n - CVE-2022-21549: Fixed an issue that could lead to computing\n negative random exponentials (bsc#1201685).\n - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201692).\n - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201694).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2898,SUSE-OpenStack-Cloud-9-2022-2898,SUSE-OpenStack-Cloud-Crowbar-9-2022-2898,SUSE-SLE-SAP-12-SP4-2022-2898,SUSE-SLE-SDK-12-SP5-2022-2898,SUSE-SLE-SERVER-12-SP2-BCL-2022-2898,SUSE-SLE-SERVER-12-SP3-BCL-2022-2898,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2898,SUSE-SLE-SERVER-12-SP5-2022-2898", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2898-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2898-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222898-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2898-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201685", "url": "https://bugzilla.suse.com/1201685" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE Bug 1202427", "url": "https://bugzilla.suse.com/1202427" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_7_1-ibm", "tracking": { "current_release_date": "2022-08-25T18:34:10Z", "generator": { "date": "2022-08-25T18:34:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2898-1", "initial_release_date": "2022-08-25T18:34:10Z", "revision_history": [ { "date": "2022-08-25T18:34:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.i586", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.i586", "product_id": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "product": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "product_id": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.ppc64le", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.ppc64le", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.ppc64le", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.ppc64le", "product_id": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390", "product": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390", "product_id": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.s390", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.s390", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.s390", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.s390", "product_id": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-32bit-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-32bit-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-32bit-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-devel-32bit-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr5.15-38.74.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.s390x", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.s390x", "product_id": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-32bit-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-32bit-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-32bit-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-devel-32bit-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.x86_64", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.x86_64", "product_id": "java-1_7_1-ibm-src-1.7.1_sr5.15-38.74.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:34:10Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:34:10Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:34:10Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr5.15-38.74.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr5.15-38.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:34:10Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:2819-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Updated to version jdk8u345 (icedtea-3.24.0)\n - CVE-2022-21540: Fixed a potential Java sandbox bypass (bsc#1201694).\n - CVE-2022-21541: Fixed a potential Java sandbox bypass (bsc#1201692).\n - CVE-2022-34169: Fixed an issue where arbitrary bytecode could\n be executed via a malicious stylesheet (bsc#1201684).\n\n- Non-security fixes:\n - Allowed for customization of PKCS12 keystores (bsc#1195163).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2819,SUSE-OpenStack-Cloud-9-2022-2819,SUSE-OpenStack-Cloud-Crowbar-9-2022-2819,SUSE-SLE-SAP-12-SP4-2022-2819,SUSE-SLE-SERVER-12-SP2-BCL-2022-2819,SUSE-SLE-SERVER-12-SP3-BCL-2022-2819,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2819,SUSE-SLE-SERVER-12-SP5-2022-2819", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2819-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2819-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222819-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2819-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" }, { "category": "self", "summary": "SUSE Bug 1195163", "url": "https://bugzilla.suse.com/1195163" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2022-08-16T11:23:51Z", "generator": { "date": "2022-08-16T11:23:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2819-1", "initial_release_date": "2022-08-16T11:23:51Z", "revision_history": [ { "date": "2022-08-16T11:23:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.345-27.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-27.78.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-27.78.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.345-27.78.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390", "product_id": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.s390", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.s390", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.s390", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.s390", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-27.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-27.78.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-16T11:23:51Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-16T11:23:51Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.345-27.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.345-27.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-16T11:23:51Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:2899-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- Update to Java 8.0 Service Refresh 7 Fix Pack 11 (bsc#1202427):\n - CVE-2022-34169: Fixed an integer truncation issue in the Xalan\n Java XSLT library that occurred when processing malicious\n stylesheets (bsc#1201684).\n - CVE-2022-21549: Fixed an issue that could lead to computing\n negative random exponentials (bsc#1201685).\n - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201692).\n - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201694).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2899,SUSE-OpenStack-Cloud-9-2022-2899,SUSE-OpenStack-Cloud-Crowbar-9-2022-2899,SUSE-SLE-SAP-12-SP4-2022-2899,SUSE-SLE-SDK-12-SP5-2022-2899,SUSE-SLE-SERVER-12-SP2-BCL-2022-2899,SUSE-SLE-SERVER-12-SP3-BCL-2022-2899,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2899,SUSE-SLE-SERVER-12-SP5-2022-2899", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2899-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2899-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222899-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2899-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201685", "url": "https://bugzilla.suse.com/1201685" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE Bug 1202427", "url": "https://bugzilla.suse.com/1202427" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2022-08-25T18:35:11Z", "generator": { "date": "2022-08-25T18:35:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2899-1", "initial_release_date": "2022-08-25T18:35:11Z", "revision_history": [ { "date": "2022-08-25T18:35:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.s390", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.s390", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.s390", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.s390", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-30.93.1.s390x", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-30.93.1.s390x", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-30.93.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-30.93.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-30.93.1.s390x", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-30.93.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-30.93.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:35:11Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:35:11Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:35:11Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr7.11-30.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr7.11-30.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-25T18:35:11Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:4166-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- CVE-2022-21626: An unauthenticated attacker with network access via HTTPS can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204471).\n- CVE-2022-21618: An unauthenticated attacker with network access via Kerberos can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204468).\n- CVE-2022-21619: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE (bsc#1204473).\n- CVE-2022-21628: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204472).\n- CVE-2022-21624: An unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise (bsc#1204475).\n- CVE-2022-39399: An unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1204480).\n- CVE-2022-21549: Fixed exponentials issue (bsc#1201685).\n- CVE-2022-21541: Fixed an improper restriction of MethodHandle.invokeBasic() (bsc#1201692).\n- CVE-2022-34169; Fixed an integer truncation issue in Xalan (bsc#1201684).\n- CVE-2022-21540: Fixed a class compilation issue (bsc#1201694).\n\n\n- Update to Java 8.0 Service Refresh 7 Fix Pack 20.\n * Security:\n - The IBM ORB Does Not Support Object-Serialisation Data Filtering\n - Large Allocation In CipherSuite\n - Avoid Evaluating Sslalgorithmconstraints Twice\n - Cache The Results Of Constraint Checks\n - An incorrect ShortBufferException is thrown by IBMJCEPlus,\n IBMJCEPlusFIPS during cipher update operation\n - Disable SHA-1 Signed Jars For Ea\n - JSSE Performance Improvement\n - Oracle Road Map Kerberos Deprecation Of 3DES And RC4 Encryption\n * Java 8/Orb:\n - Upgrade ibmcfw.jar To Version o2228.02\n * Class Libraries:\n - Crash In Libjsor.So During An Rdma Failover\n - High CPU Consumption Observed In ZosEventPort$EventHandlerTask.run\n - Update Timezone Information To The Latest tzdata2022c\n * Jit Compiler:\n - Crash During JIT Compilation\n - Incorrect JIT Optimization Of Java Code\n - Incorrect Return From Class.isArray()\n - Unexpected ClassCastException\n - Performance Regression When Calling VM Helper Code On X86\n * X/Os Extentions:\n - Add RSA-OAEP Cipher Function To IBMJCECCA\n\n- Update to Java 8.0 Service Refresh 7 Fix Pack 16\n * Java Virtual Machine\n - Assertion failure at ClassLoaderRememberedSet.cpp\n\t- Assertion failure at StandardAccessBarrier.cpp when\n\t -Xgc:concurrentScavenge is set.\n - GC can have unflushed ownable synchronizer objects which\n\t can eventually lead to heap corruption and failure when\n\t -Xgc:concurrentScavenge is set.\n *\tJIT Compiler:\n - Incorrect JIT optimization of Java code\n - JAVA JIT Power: JIT compile time assert on AIX or LINUXPPC\n *\tReliability and Serviceability:\n - javacore with \u0027kill -3\u0027 SIGQUIT signal freezes Java process\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-4166,SUSE-SLE-Module-Legacy-15-SP3-2022-4166,SUSE-SLE-Module-Legacy-15-SP4-2022-4166,SUSE-SLE-Product-SLES-15-2022-4166,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4166,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4166,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4166,SUSE-SLE-Product-SLES_SAP-15-2022-4166,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4166,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4166,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4166,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4166,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4166,SUSE-Storage-6-2022-4166,SUSE-Storage-7-2022-4166,openSUSE-SLE-15.3-2022-4166,openSUSE-SLE-15.4-2022-4166", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4166-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:4166-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224166-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:4166-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201685", "url": "https://bugzilla.suse.com/1201685" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE Bug 1202427", "url": "https://bugzilla.suse.com/1202427" }, { "category": "self", "summary": "SUSE Bug 1204468", "url": "https://bugzilla.suse.com/1204468" }, { "category": "self", "summary": "SUSE Bug 1204471", "url": "https://bugzilla.suse.com/1204471" }, { "category": "self", "summary": "SUSE Bug 1204472", "url": "https://bugzilla.suse.com/1204472" }, { "category": "self", "summary": "SUSE Bug 1204473", "url": "https://bugzilla.suse.com/1204473" }, { "category": "self", "summary": "SUSE Bug 1204475", "url": "https://bugzilla.suse.com/1204475" }, { "category": "self", "summary": "SUSE Bug 1204480", "url": "https://bugzilla.suse.com/1204480" }, { "category": "self", "summary": "SUSE Bug 1205302", "url": "https://bugzilla.suse.com/1205302" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21618 page", "url": "https://www.suse.com/security/cve/CVE-2022-21618/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21619 page", "url": "https://www.suse.com/security/cve/CVE-2022-21619/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21624 page", "url": "https://www.suse.com/security/cve/CVE-2022-21624/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21626 page", "url": "https://www.suse.com/security/cve/CVE-2022-21626/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21628 page", "url": "https://www.suse.com/security/cve/CVE-2022-21628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-39399 page", "url": "https://www.suse.com/security/cve/CVE-2022-39399/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2022-11-22T10:09:13Z", "generator": { "date": "2022-11-22T10:09:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:4166-1", "initial_release_date": "2022-11-22T10:09:13Z", "revision_history": [ { "date": "2022-11-22T10:09:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21618" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21618", "url": "https://www.suse.com/security/cve/CVE-2022-21618" }, { "category": "external", "summary": "SUSE Bug 1204468 for CVE-2022-21618", "url": "https://bugzilla.suse.com/1204468" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21618", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "moderate" } ], "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21619" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21619", "url": "https://www.suse.com/security/cve/CVE-2022-21619" }, { "category": "external", "summary": "SUSE Bug 1204473 for CVE-2022-21619", "url": "https://bugzilla.suse.com/1204473" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21619", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "low" } ], "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21624" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21624", "url": "https://www.suse.com/security/cve/CVE-2022-21624" }, { "category": "external", "summary": "SUSE Bug 1204475 for CVE-2022-21624", "url": "https://bugzilla.suse.com/1204475" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21624", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "low" } ], "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21626" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21626", "url": "https://www.suse.com/security/cve/CVE-2022-21626" }, { "category": "external", "summary": "SUSE Bug 1204471 for CVE-2022-21626", "url": "https://bugzilla.suse.com/1204471" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21626", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "moderate" } ], "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21628" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21628", "url": "https://www.suse.com/security/cve/CVE-2022-21628" }, { "category": "external", "summary": "SUSE Bug 1204472 for CVE-2022-21628", "url": "https://bugzilla.suse.com/1204472" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-21628", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "moderate" } ], "title": "CVE-2022-21628" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "important" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-39399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-39399" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-39399", "url": "https://www.suse.com/security/cve/CVE-2022-39399" }, { "category": "external", "summary": "SUSE Bug 1204480 for CVE-2022-39399", "url": "https://bugzilla.suse.com/1204480" }, { "category": "external", "summary": "SUSE Bug 1205302 for CVE-2022-39399", "url": "https://bugzilla.suse.com/1205302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.20-150000.3.65.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.20-150000.3.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-11-22T10:09:13Z", "details": "low" } ], "title": "CVE-2022-39399" } ] }
suse-su-2022:2856-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Updated to version jdk8u345 (icedtea-3.24.0)\n - CVE-2022-21540: Fixed a potential Java sandbox bypass (bsc#1201694).\n - CVE-2022-21541: Fixed a potential Java sandbox bypass (bsc#1201692).\n - CVE-2022-34169: Fixed an issue where arbitrary bytecode could\n be executed via a malicious stylesheet (bsc#1201684).\n\n- Non-security fixes:\n - Allowed for customization of PKCS12 keystores (bsc#1195163).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2856,SUSE-SLE-Module-Legacy-15-SP3-2022-2856,SUSE-SLE-Module-Legacy-15-SP4-2022-2856,SUSE-SLE-Product-SLES-15-2022-2856,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2856,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2856,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2856,SUSE-SLE-Product-SLES_SAP-15-2022-2856,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2856,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2856,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2856,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2856,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2856,SUSE-Storage-6-2022-2856,SUSE-Storage-7-2022-2856,openSUSE-SLE-15.3-2022-2856,openSUSE-SLE-15.4-2022-2856", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2856-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2856-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222856-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2856-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" }, { "category": "self", "summary": "SUSE Bug 1195163", "url": "https://bugzilla.suse.com/1195163" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2022-08-19T14:11:08Z", "generator": { "date": "2022-08-19T14:11:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2856-1", "initial_release_date": "2022-08-19T14:11:08Z", "revision_history": [ { "date": "2022-08-19T14:11:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:11:08Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:11:08Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 6:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Enterprise Storage 7:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-accessibility-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-demo-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-devel-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-headless-1.8.0.345-150000.3.70.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openjdk-javadoc-1.8.0.345-150000.3.70.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openjdk-src-1.8.0.345-150000.3.70.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:11:08Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:2707-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\nUpdate to upstream tag jdk-11.0.16+8 (July 2022 CPU)\n\n- CVE-2022-21540: Improve class compilation (bsc#1201694)\n- CVE-2022-21541: Enhance MethodHandle invocations (bsc#1201692)\n- CVE-2022-34169: Improve Xalan supports (bsc#1201684)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2707,SUSE-SLE-Module-Basesystem-15-SP3-2022-2707,SUSE-SLE-Module-Basesystem-15-SP4-2022-2707,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2707,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2707,SUSE-SLE-Product-HPC-15-2022-2707,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2707,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2707,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2707,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2707,SUSE-SLE-Product-SLES-15-2022-2707,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2707,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2707,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2707,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2707,SUSE-SLE-Product-SLES_SAP-15-2022-2707,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2707,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2707,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2707,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2707,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2707,SUSE-Storage-6-2022-2707,SUSE-Storage-7-2022-2707,openSUSE-SLE-15.3-2022-2707,openSUSE-SLE-15.4-2022-2707", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2707-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2707-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222707-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2707-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2022-08-09T08:18:52Z", "generator": { "date": "2022-08-09T08:18:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2707-1", "initial_release_date": "2022-08-09T08:18:52Z", "revision_history": [ { "date": "2022-08-09T08:18:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "product_id": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-11.0.16.0-150000.3.83.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.i586", "product": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.i586", "product_id": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "product_id": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "product_id": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T08:18:52Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T08:18:52Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 6:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Enterprise Storage 7:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Proxy 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "SUSE Manager Server 4.1:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.3:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-accessibility-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-demo-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-devel-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-headless-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-javadoc-11.0.16.0-150000.3.83.1.noarch", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-jmods-11.0.16.0-150000.3.83.1.x86_64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.aarch64", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.ppc64le", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.s390x", "openSUSE Leap 15.4:java-11-openjdk-src-11.0.16.0-150000.3.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T08:18:52Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:2949-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- Updated to Java 8.0 Service Refresh 7 Fix Pack 11 (bsc#1202427):\n - CVE-2022-34169: Fixed an integer truncation issue in the Xalan\n Java XSLT library that occurred when processing malicious\n stylesheets (bsc#1201684).\n - CVE-2022-21549: Fixed an issue that could lead to computing\n negative random exponentials (bsc#1201685).\n - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201692).\n - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201694).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2949,SUSE-SLE-Module-Legacy-15-SP3-2022-2949,SUSE-SLE-Module-Legacy-15-SP4-2022-2949,SUSE-SLE-Product-SLES-15-2022-2949,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2949,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2949,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2949,SUSE-SLE-Product-SLES_SAP-15-2022-2949,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2949,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2949,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2949,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2949,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2949,SUSE-Storage-6-2022-2949,SUSE-Storage-7-2022-2949,openSUSE-SLE-15.3-2022-2949,openSUSE-SLE-15.4-2022-2949", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2949-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2949-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222949-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2949-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201685", "url": "https://bugzilla.suse.com/1201685" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE Bug 1202427", "url": "https://bugzilla.suse.com/1202427" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21549 page", "url": "https://www.suse.com/security/cve/CVE-2022-21549/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2022-08-31T07:20:38Z", "generator": { "date": "2022-08-31T07:20:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2949-1", "initial_release_date": "2022-08-31T07:20:38Z", "revision_history": [ { "date": "2022-08-31T07:20:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" }, "product_reference": "java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-31T07:20:38Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-31T07:20:38Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21549", "url": "https://www.suse.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "SUSE Bug 1201685 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1201685" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21549", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-31T07:20:38Z", "details": "moderate" } ], "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 6:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Enterprise Storage 7:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Proxy 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Retail Branch Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "SUSE Manager Server 4.1:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "SUSE Manager Server 4.1:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.3:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-alsa-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-demo-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-devel-32bit-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-plugin-1.8.0_sr7.11-150000.3.62.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.s390x", "openSUSE Leap 15.4:java-1_8_0-ibm-src-1.8.0_sr7.11-150000.3.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-31T07:20:38Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:3092-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openj9", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openj9 fixes the following issues:\n\n- Updated to OpenJDK 8u345 build 01 with OpenJ9 0.33.0 virtual machine:\n - CVE-2022-34169: Fixed an integer truncation issue in the Xalan\n Java XSLT library that occurred when processing malicious\n stylesheets (bsc#1201684).\n - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201692).\n - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions\n in the Hotspot component (bsc#1201694).\n\n- Updated to OpenJDK 8u332 build 09 with OpenJ9 0.32.0 virtual machine:\n - CVE-2021-41041: Failed an issue that could allow unverified methods\n to be invoked using MethodHandles (bsc#1198935).\n - CVE-2022-21426: Fixed a remote partial denial of service issue\n (component: JAXP) (bsc#1198672).\n - CVE-2022-21434: Fixed an issue that could allow a remote attacker\n to update, insert or delete data (component: Libraries) (bsc#1198674).\n - CVE-2022-21443: Fixed a remote partial denial of service issue\n (component: Libraries) (bsc#1198675).\n - CVE-2022-21476: Fixed an issue that could allow unauthorized\n access to confidential data (component: Libraries) (bsc#1198671).\n - CVE-2022-21496: Fixed an issue that could allow a remote attacker\n to update, insert or delete data (component: JNDI) (bsc#1198673).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-3092,openSUSE-SLE-15.3-2022-3092,openSUSE-SLE-15.4-2022-3092", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3092-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:3092-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:3092-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "self", "summary": "SUSE Bug 1198671", "url": "https://bugzilla.suse.com/1198671" }, { "category": "self", "summary": "SUSE Bug 1198672", "url": "https://bugzilla.suse.com/1198672" }, { "category": "self", "summary": "SUSE Bug 1198673", "url": "https://bugzilla.suse.com/1198673" }, { "category": "self", "summary": "SUSE Bug 1198674", "url": "https://bugzilla.suse.com/1198674" }, { "category": "self", "summary": "SUSE Bug 1198675", "url": "https://bugzilla.suse.com/1198675" }, { "category": "self", "summary": "SUSE Bug 1198935", "url": "https://bugzilla.suse.com/1198935" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE CVE CVE-2021-41041 page", "url": "https://www.suse.com/security/cve/CVE-2021-41041/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21426 page", "url": "https://www.suse.com/security/cve/CVE-2022-21426/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21434 page", "url": "https://www.suse.com/security/cve/CVE-2022-21434/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21443 page", "url": "https://www.suse.com/security/cve/CVE-2022-21443/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21476 page", "url": "https://www.suse.com/security/cve/CVE-2022-21476/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21496 page", "url": "https://www.suse.com/security/cve/CVE-2022-21496/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-1_8_0-openj9", "tracking": { "current_release_date": "2022-09-06T05:51:30Z", "generator": { "date": "2022-09-06T05:51:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:3092-1", "initial_release_date": "2022-09-06T05:51:30Z", "revision_history": [ { "date": "2022-09-06T05:51:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "product": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "product_id": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "product_id": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "product": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "product_id": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "product": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "product_id": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "product_id": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "product": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "product_id": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "product_id": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "product": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "product_id": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "product_id": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "product_id": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "product_id": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "product": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "product_id": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-41041" } ], "notes": [ { "category": "general", "text": "In Eclipse Openj9 before version 0.32.0, Java 8 \u0026 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-41041", "url": "https://www.suse.com/security/cve/CVE-2021-41041" }, { "category": "external", "summary": "SUSE Bug 1198935 for CVE-2021-41041", "url": "https://bugzilla.suse.com/1198935" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "moderate" } ], "title": "CVE-2021-41041" }, { "cve": "CVE-2022-21426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21426", "url": "https://www.suse.com/security/cve/CVE-2022-21426" }, { "category": "external", "summary": "SUSE Bug 1198672 for CVE-2022-21426", "url": "https://bugzilla.suse.com/1198672" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21426", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "moderate" } ], "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21434" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21434", "url": "https://www.suse.com/security/cve/CVE-2022-21434" }, { "category": "external", "summary": "SUSE Bug 1198674 for CVE-2022-21434", "url": "https://bugzilla.suse.com/1198674" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21434", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "moderate" } ], "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21443" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21443", "url": "https://www.suse.com/security/cve/CVE-2022-21443" }, { "category": "external", "summary": "SUSE Bug 1198675 for CVE-2022-21443", "url": "https://bugzilla.suse.com/1198675" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21443", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "low" } ], "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21476" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21476", "url": "https://www.suse.com/security/cve/CVE-2022-21476" }, { "category": "external", "summary": "SUSE Bug 1198671 for CVE-2022-21476", "url": "https://bugzilla.suse.com/1198671" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21476", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "important" } ], "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21496", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21496" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21496", "url": "https://www.suse.com/security/cve/CVE-2022-21496" }, { "category": "external", "summary": "SUSE Bug 1198673 for CVE-2022-21496", "url": "https://bugzilla.suse.com/1198673" }, { "category": "external", "summary": "SUSE Bug 1201643 for CVE-2022-21496", "url": "https://bugzilla.suse.com/1201643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "moderate" } ], "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1.x86_64", "openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1.noarch", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.aarch64", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.ppc64le", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.s390x", "openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-09-06T05:51:30Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
suse-su-2022:2610-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\nUpdate to upstream tag jdk-11.0.16+8 (July 2022 CPU)\n\n- CVE-2022-21540: Improve class compilation (bsc#1201694)\n- CVE-2022-21541: Enhance MethodHandle invocations (bsc#1201692)\n- CVE-2022-34169: Improve Xalan supports (bsc#1201684)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2610,SUSE-SLE-SERVER-12-SP5-2022-2610", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2610-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2610-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222610-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2610-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" }, { "category": "self", "summary": "SUSE Bug 1201684", "url": "https://bugzilla.suse.com/1201684" }, { "category": "self", "summary": "SUSE Bug 1201692", "url": "https://bugzilla.suse.com/1201692" }, { "category": "self", "summary": "SUSE Bug 1201694", "url": "https://bugzilla.suse.com/1201694" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21540 page", "url": "https://www.suse.com/security/cve/CVE-2022-21540/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21541 page", "url": "https://www.suse.com/security/cve/CVE-2022-21541/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34169 page", "url": "https://www.suse.com/security/cve/CVE-2022-34169/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2022-08-01T07:56:01Z", "generator": { "date": "2022-08-01T07:56:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2610-1", "initial_release_date": "2022-08-01T07:56:01Z", "revision_history": [ { "date": "2022-08-01T07:56:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-11.0.16.0-3.46.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.16.0-3.46.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-3.46.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.16.0-3.46.1.aarch64", "product_id": "java-11-openjdk-src-11.0.16.0-3.46.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-11.0.16.0-3.46.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-demo-11.0.16.0-3.46.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-devel-11.0.16.0-3.46.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-headless-11.0.16.0-3.46.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-jmods-11.0.16.0-3.46.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-3.46.1.i586", "product": { "name": "java-11-openjdk-src-11.0.16.0-3.46.1.i586", "product_id": "java-11-openjdk-src-11.0.16.0-3.46.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.16.0-3.46.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.16.0-3.46.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.16.0-3.46.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.16.0-3.46.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-3.46.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.16.0-3.46.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.16.0-3.46.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-11.0.16.0-3.46.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.16.0-3.46.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-3.46.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.16.0-3.46.1.s390x", "product_id": "java-11-openjdk-src-11.0.16.0-3.46.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-11.0.16.0-3.46.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.16.0-3.46.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.16.0-3.46.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.16.0-3.46.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.16.0-3.46.1.x86_64", "product_id": "java-11-openjdk-src-11.0.16.0-3.46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21540" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21540", "url": "https://www.suse.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "SUSE Bug 1201694 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1201694" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21540", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T07:56:01Z", "details": "moderate" } ], "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21541" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21541", "url": "https://www.suse.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "SUSE Bug 1201692 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1201692" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-21541", "url": "https://bugzilla.suse.com/1202427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T07:56:01Z", "details": "moderate" } ], "title": "CVE-2022-21541" }, { "cve": "CVE-2022-34169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34169" } ], "notes": [ { "category": "general", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34169", "url": "https://www.suse.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "SUSE Bug 1201684 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1201684" }, { "category": "external", "summary": "SUSE Bug 1202427 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1202427" }, { "category": "external", "summary": "SUSE Bug 1207688 for CVE-2022-34169", "url": "https://bugzilla.suse.com/1207688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.16.0-3.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.16.0-3.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T07:56:01Z", "details": "important" } ], "title": "CVE-2022-34169" } ] }
ncsc-2024-0294
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Communications.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41184" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42890" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48174" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22019" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22234" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23672" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23807" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23897" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26130" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27316" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2961" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34064" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34069" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6162" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-07-17T13:52:53.293003Z", "id": "NCSC-2024-0294", "initial_release_date": "2024-07-17T13:52:53.293003Z", "revision_history": [ { "date": "2024-07-17T13:52:53.293003Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2019-10086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-10086.json" } ], "title": "CVE-2019-10086" }, { "cve": "CVE-2021-29425", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-29425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-29425.json" } ], "title": "CVE-2021-29425" }, { "cve": "CVE-2021-37533", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37533.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2021-37533" }, { "cve": "CVE-2021-41184", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-41184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-204629", "CSAFPID-816792" ] } ], "title": "CVE-2021-41184" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-42890", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42890", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42890.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-42890" }, { "cve": "CVE-2022-48174", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-48174", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48174.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-48174" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-22019", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22019" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22234", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22234", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22234.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22234" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23897", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23897.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23897" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27316", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27316", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28752", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28752.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28752" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34069", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34069" } ] }
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CWE-18", "title": "CWE-18" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2024-10-17T13:15:19.595269Z", "id": "NCSC-2024-0411", "initial_release_date": "2024-10-17T13:15:19.595269Z", "revision_history": [ { "date": "2024-10-17T13:15:19.595269Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673504", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673509", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph_mapviewer", "product": { "name": "spatial_and_graph_mapviewer", "product_id": "CSAFPID-912561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-764250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673512", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-816800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673529", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning_-_micronaut", "product": { "name": "fleet_patching_and_provisioning_-_micronaut", "product_id": "CSAFPID-1673492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning", "product": { "name": "fleet_patching_and_provisioning", "product_id": "CSAFPID-1503603", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673451", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673450", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673452", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-1673525", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816361", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-816801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-1673405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_administration", "product": { "name": "application_express_administration", "product_id": "CSAFPID-764731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_customers_plugin", "product": { "name": "application_express_customers_plugin", "product_id": "CSAFPID-764732", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_team_calendar_plugin", "product": { "name": "application_express_team_calendar_plugin", "product_id": "CSAFPID-764733", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-266119", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-764779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-89587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-765259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-187448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-94075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-220886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-611394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-816317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-912567", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1503612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1673479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_essbase", "product": { "name": "oracle_essbase", "product_id": "CSAFPID-1650506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1673404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data", "product": { "name": "goldengate_big_data", "product_id": "CSAFPID-764274", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-764752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-1673384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-816846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-611390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-764803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_veridata", "product": { "name": "goldengate_veridata", "product_id": "CSAFPID-764275", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-219912", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_stream_analytics", "product": { "name": "oracle_goldengate_stream_analytics", "product_id": "CSAFPID-1650515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-764861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-1503640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_studio", "product": { "name": "oracle_goldengate_studio", "product_id": "CSAFPID-1650835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate", "product": { "name": "oracle_goldengate", "product_id": "CSAFPID-1650575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_nosql_database", "product": { "name": "oracle_nosql_database", "product_id": "CSAFPID-1650584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_secure_backup", "product": { "name": "oracle_secure_backup", "product_id": "CSAFPID-1650563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_sql_developer", "product": { "name": "oracle_sql_developer", "product_id": "CSAFPID-1650638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-764822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-220643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-1673397", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" }, { "branches": [ { "category": "product_name", "name": "oracle_application_express", "product": { "name": "oracle_application_express", "product_id": "CSAFPID-1673144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle_corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-220886", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764822", "CSAFPID-1650515", "CSAFPID-1650638", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-89587", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044" ] }, "references": [ { "category": "self", "summary": "CVE-2022-1471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json" } ], "title": "CVE-2022-1471" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-38136", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json" } ], "title": "CVE-2022-38136" }, { "cve": "CVE-2022-40196", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-40196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json" } ], "title": "CVE-2022-40196" }, { "cve": "CVE-2022-41342", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41342", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json" } ], "title": "CVE-2022-41342" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json" } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-45061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] }, "references": [ { "category": "self", "summary": "CVE-2022-46337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] } ], "title": "CVE-2022-46337" }, { "cve": "CVE-2023-2976", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "notes": [ { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2976", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-2976" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-4759", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4759", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-4759" }, { "cve": "CVE-2023-4863", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json" } ], "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-26551", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26551", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json" } ], "scores": [ { "cvss_v3": { "baseScore": 0.0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26551" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-26555", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26555", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26555" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-44981", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] } ], "title": "CVE-2023-44981" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-49083" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-1874", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-1874" }, { "cve": "CVE-2024-2408", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-2408" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5458", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5458" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-21131", "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "product_status": { "known_affected": [ "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "product_status": { "known_affected": [ "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21233", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-21233" }, { "cve": "CVE-2024-21242", "product_status": { "known_affected": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] } ], "title": "CVE-2024-21242" }, { "cve": "CVE-2024-21251", "product_status": { "known_affected": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] } ], "title": "CVE-2024-21251" }, { "cve": "CVE-2024-21261", "product_status": { "known_affected": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-21261" }, { "cve": "CVE-2024-22018", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22018", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23944", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23944", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23944" }, { "cve": "CVE-2024-24989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json" } ], "title": "CVE-2024-24989" }, { "cve": "CVE-2024-24990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24990", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-24990" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27983", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27983", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-27983" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-28887", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-28887" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-31079", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-31079" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-34161", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-34161" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673504", "CSAFPID-1673506" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673504", "CSAFPID-1673506" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35200", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-35200" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json" } ], "title": "CVE-2024-36138" }, { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37372", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37372", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-37372" }, { "cve": "CVE-2024-38356", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38356", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38356" }, { "cve": "CVE-2024-38357", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38357", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38357" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39573" }, { "cve": "CVE-2024-39884", "cwe": { "id": "CWE-18", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-18", "title": "CWE-18" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39884", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39884" }, { "cve": "CVE-2024-40725", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40725", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40725" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45801", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-45801" } ] }
ncsc-2024-0306
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Supply Chain.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37536" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": " Kwetsbaarheden verholpen in Oracle Supply Chain", "tracking": { "current_release_date": "2024-07-17T13:55:37.062720Z", "id": "NCSC-2024-0306", "initial_release_date": "2024-07-17T13:55:37.062720Z", "revision_history": [ { "date": "2024-07-17T13:55:37.062720Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "agile_engineering_data_management", "product": { "name": "agile_engineering_data_management", "product_id": "CSAFPID-764768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:agile_engineering_data_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autovue_for_agile_product_lifecycle_management", "product": { "name": "autovue_for_agile_product_lifecycle_management", "product_id": "CSAFPID-2302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-2302", "CSAFPID-764768" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-2302", "CSAFPID-764768" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-37536", "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37536", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37536.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764768", "CSAFPID-2302" ] } ], "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764768", "CSAFPID-2302" ] } ], "title": "CVE-2023-46589" } ] }
ncsc-2024-0305
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Siebel CRM.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Improper Neutralization of Null Byte or NUL Character", "title": "CWE-158" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36090" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22081" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41105" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47627" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5678" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5764" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Siebel CRM", "tracking": { "current_release_date": "2024-07-17T13:55:31.923970Z", "id": "NCSC-2024-0305", "initial_release_date": "2024-07-17T13:55:31.923970Z", "revision_history": [ { "date": "2024-07-17T13:55:31.923970Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "siebel_crm_cloud_applications", "product": { "name": "siebel_crm_cloud_applications", "product_id": "CSAFPID-1503695", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_cloud_applications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_deployment", "product": { "name": "siebel_crm_deployment", "product_id": "CSAFPID-1503697", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_deployment:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_end_user", "product": { "name": "siebel_crm_end_user", "product_id": "CSAFPID-1503700", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_end_user:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_integration", "product": { "name": "siebel_crm_integration", "product_id": "CSAFPID-1503702", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_integration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-764293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-345046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-220191", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:23.5:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36090", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2021-36090", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-36090.json" } ], "title": "CVE-2021-36090" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37434", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37434.json" } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42003", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42003.json" } ], "title": "CVE-2022-42003" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5764", "cwe": { "id": "CWE-1336", "name": "Improper Neutralization of Special Elements Used in a Template Engine" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5764", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5764.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5764" }, { "cve": "CVE-2023-22081", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-22081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-22081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-22081" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-41105", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Null Byte or NUL Character", "title": "CWE-158" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-41105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-41105" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-47627", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-47627", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47627.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-47627" } ] }
ncsc-2025-0025
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in Financial Services en componenten.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om toegang te krijgen tot kritieke gegevens en de systeemintegriteit in gevaar te brengen. Specifieke kwetsbaarheden kunnen leiden tot compromittering van vertrouwelijkheid, integriteit en beschikbaarheid, met schadeclassificaties vari\u00ebrend van gemiddeld tot hoog. Sommige kwetsbaarheden kunnen op afstand worden uitgebuit zonder gebruikersinteractie, wat het risico op privilege-escalatie en denial-of-service vergroot.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Financial Services", "tracking": { "current_release_date": "2025-01-22T13:33:00.723963Z", "id": "NCSC-2025-0025", "initial_release_date": "2025-01-22T13:33:00.723963Z", "revision_history": [ { "date": "2025-01-22T13:33:00.723963Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-342808", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-1751072", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-9711", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-1751083", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-9300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345043", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-9522", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345042", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-8848", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-93309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189066", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-93305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189064", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189063", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-1751078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189065", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_reconciliation_framework", "product": { "name": "financial_services_analytical_applications_reconciliation_framework", "product_id": "CSAFPID-363146", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.0.7.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_reconciliation_framework", "product": { "name": "financial_services_analytical_applications_reconciliation_framework", "product_id": "CSAFPID-363129", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.1.1.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_asset_liability_management", "product": { "name": "financial_services_asset_liability_management", "product_id": "CSAFPID-363142", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.7.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_balance_computation_engine", "product": { "name": "financial_services_balance_computation_engine", "product_id": "CSAFPID-363130", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_balance_computation_engine:8.1.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_balance_sheet_planning", "product": { "name": "financial_services_balance_sheet_planning", "product_id": "CSAFPID-363135", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_basic", "product": { "name": "financial_services_basel_regulatory_capital_basic", "product_id": "CSAFPID-1503626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_basic", "product": { "name": "financial_services_basel_regulatory_capital_basic", "product_id": "CSAFPID-1503627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product": { "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product_id": "CSAFPID-1503628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.0.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product": { "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product_id": "CSAFPID-1503629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.0.8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-765261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-93312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-220456", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.7.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-93311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-189067", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-93308", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-93307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-93306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-220368", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-220449", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-345041", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-219772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-219770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-816828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-1503630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-1751074", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_cash_flow_engine", "product": { "name": "financial_services_cash_flow_engine", "product_id": "CSAFPID-764273", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_cash_flow_engine:8.1.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-345047", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-816829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-1503631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-1503632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-93648", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-93647", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-764857", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-391382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-765262", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:_studio___8.0.8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-765263", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:_studio___8.0.8.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.0.8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.1.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493289", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.1.2.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493288", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.1.2.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_governance_for_us_regulatory_reporting", "product": { "name": "financial_services_data_governance_for_us_regulatory_reporting", "product_id": "CSAFPID-363128", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_governance_for_us_regulatory_reporting", "product": { "name": "financial_services_data_governance_for_us_regulatory_reporting", "product_id": "CSAFPID-363127", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:8.1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_integration_hub", "product": { "name": "financial_services_data_integration_hub", "product_id": "CSAFPID-363144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.7.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_integration_hub", "product": { "name": "financial_services_data_integration_hub", "product_id": "CSAFPID-363131", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_integration_hub", "product": { "name": "financial_services_data_integration_hub", "product_id": "CSAFPID-363126", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product": { "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product_id": "CSAFPID-363143", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_deposit_insurance_calculations_for_liquidity_risk_management:8.0.7.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product": { "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product_id": "CSAFPID-363133", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_deposit_insurance_calculations_for_liquidity_risk_management:8.0.8.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-567702", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220378", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220377", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220455", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220372", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-219774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-180191", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-180190", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-180189", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220369", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-220448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-345040", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-219773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-219771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-816830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_financial_performance_analytics", "product": { "name": "financial_services_enterprise_financial_performance_analytics", "product_id": "CSAFPID-363141", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_funds_transfer_pricing", "product": { "name": "financial_services_funds_transfer_pricing", "product_id": "CSAFPID-363138", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_institutional_performance_analytics", "product": { "name": "financial_services_institutional_performance_analytics", "product_id": "CSAFPID-363136", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_lending_and_leasing", "product": { "name": "financial_services_lending_and_leasing", "product_id": "CSAFPID-816831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_liquidity_risk_measurement_and_management", "product": { "name": "financial_services_liquidity_risk_measurement_and_management", "product_id": "CSAFPID-363145", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_liquidity_risk_measurement_and_management", "product": { "name": "financial_services_liquidity_risk_measurement_and_management", "product_id": "CSAFPID-363132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_loan_loss_forecasting_and_provisioning", "product": { "name": "financial_services_loan_loss_forecasting_and_provisioning", "product_id": "CSAFPID-363140", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_loan_loss_forecasting_and_provisioning", "product": { "name": "financial_services_loan_loss_forecasting_and_provisioning", "product_id": "CSAFPID-363134", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-764923", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-396508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-764924", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-396507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-611392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-611391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-1503319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-1503318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-1751202", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-1751086", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_profitability_management", "product": { "name": "financial_services_profitability_management", "product_id": "CSAFPID-363139", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_profitability_management:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.0.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-1751214", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-1751213", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting_with_agilereporter", "product": { "name": "financial_services_regulatory_reporting_with_agilereporter", "product_id": "CSAFPID-611433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting_with_agilereporter:8.1.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_retail_performance_analytics", "product": { "name": "financial_services_retail_performance_analytics", "product_id": "CSAFPID-363137", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_retail_performance_analytics:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-765266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-344846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-912589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816832", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219832", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-1751215", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.0.0-7.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-765264", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-765265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816834", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-344845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-400311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-912590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816836", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-400309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816837", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-400307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:4.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-912591", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219827", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-912592", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816839", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816841", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:5.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-1503637", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-1503638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:6.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:_pricing_services___2.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-816840", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:_security___5.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_trade-based_anti_money_laundering", "product": { "name": "financial_services_trade-based_anti_money_laundering", "product_id": "CSAFPID-1751087", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_trade-based_anti_money_laundering", "product": { "name": "financial_services_trade-based_anti_money_laundering", "product_id": "CSAFPID-220375", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*" } } }, { "category": "product_name", "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product": { "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product_id": "CSAFPID-764925", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering_enterprise_edition:8.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product": { "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product_id": "CSAFPID-764796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering_enterprise_edition:8.0.8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product": { "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product_id": "CSAFPID-764926", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering_enterprise_edition:8.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product": { "name": "financial_services_trade-based_anti_money_laundering_enterprise_edition", "product_id": "CSAFPID-220374", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering_enterprise_edition:8.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-764262", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-180213", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-180207", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912094", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912093", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912092", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-816824", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-1673499", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-764263", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-180208", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-1751207", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.5.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912064", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912063", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912062", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-764259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1751206", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0.0.0-14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503614", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-180204", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503615", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503616", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.7.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "other", "text": "Incorrect Type Conversion or Cast", "title": "CWE-704" } ], "product_status": { "known_affected": [ "CSAFPID-219827", "CSAFPID-219828", "CSAFPID-219829", "CSAFPID-219830", "CSAFPID-344845", "CSAFPID-219831", "CSAFPID-219832", "CSAFPID-344846", "CSAFPID-219833", "CSAFPID-764259", "CSAFPID-345045", "CSAFPID-345044", "CSAFPID-345043", "CSAFPID-345042", "CSAFPID-93309", "CSAFPID-93305", "CSAFPID-189064", "CSAFPID-189063", "CSAFPID-363146", "CSAFPID-363129", "CSAFPID-363142", "CSAFPID-363130", "CSAFPID-363135", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-345041", "CSAFPID-219772", "CSAFPID-345047", "CSAFPID-391382", "CSAFPID-493291", "CSAFPID-493290", "CSAFPID-493289", "CSAFPID-493288", "CSAFPID-363128", "CSAFPID-363127", "CSAFPID-363144", "CSAFPID-363131", "CSAFPID-363126", "CSAFPID-363143", "CSAFPID-363133", "CSAFPID-219774", "CSAFPID-180190", "CSAFPID-345040", "CSAFPID-219773", "CSAFPID-363141", "CSAFPID-363138", "CSAFPID-363136", "CSAFPID-363145", "CSAFPID-363132", "CSAFPID-363140", "CSAFPID-363134", "CSAFPID-396508", "CSAFPID-396507", "CSAFPID-363139", "CSAFPID-570314", "CSAFPID-570313", "CSAFPID-570312", "CSAFPID-570311", "CSAFPID-611433", "CSAFPID-363137", "CSAFPID-764796", "CSAFPID-764857", "CSAFPID-342808", "CSAFPID-220456", "CSAFPID-93308", "CSAFPID-93306", "CSAFPID-220368", "CSAFPID-220449", "CSAFPID-220455", "CSAFPID-180191", "CSAFPID-180189", "CSAFPID-220369", "CSAFPID-220448", "CSAFPID-764923", "CSAFPID-764924", "CSAFPID-764925", "CSAFPID-764926", "CSAFPID-764262", "CSAFPID-816824", "CSAFPID-764263", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-180204", "CSAFPID-180213", "CSAFPID-180207", "CSAFPID-180208", "CSAFPID-93312", "CSAFPID-93311", "CSAFPID-765261", "CSAFPID-765262", "CSAFPID-93648", "CSAFPID-765263", "CSAFPID-93647", "CSAFPID-220378", "CSAFPID-220377", "CSAFPID-220607", "CSAFPID-220372", "CSAFPID-567702", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-765266", "CSAFPID-400307", "CSAFPID-8848", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-219770", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-219771", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-220374", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912589", "CSAFPID-400311", "CSAFPID-912590", "CSAFPID-400309", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-219827", "CSAFPID-219828", "CSAFPID-219829", "CSAFPID-219830", "CSAFPID-344845", "CSAFPID-219831", "CSAFPID-219832", "CSAFPID-344846", "CSAFPID-219833", "CSAFPID-764259", "CSAFPID-345045", "CSAFPID-345044", "CSAFPID-345043", "CSAFPID-345042", "CSAFPID-93309", "CSAFPID-93305", "CSAFPID-189064", "CSAFPID-189063", "CSAFPID-363146", "CSAFPID-363129", "CSAFPID-363142", "CSAFPID-363130", "CSAFPID-363135", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-345041", "CSAFPID-219772", "CSAFPID-345047", "CSAFPID-391382", "CSAFPID-493291", "CSAFPID-493290", "CSAFPID-493289", "CSAFPID-493288", "CSAFPID-363128", "CSAFPID-363127", "CSAFPID-363144", "CSAFPID-363131", "CSAFPID-363126", "CSAFPID-363143", "CSAFPID-363133", "CSAFPID-219774", "CSAFPID-180190", "CSAFPID-345040", "CSAFPID-219773", "CSAFPID-363141", "CSAFPID-363138", "CSAFPID-363136", "CSAFPID-363145", "CSAFPID-363132", "CSAFPID-363140", "CSAFPID-363134", "CSAFPID-396508", "CSAFPID-396507", "CSAFPID-363139", "CSAFPID-570314", "CSAFPID-570313", "CSAFPID-570312", "CSAFPID-570311", "CSAFPID-611433", "CSAFPID-363137", "CSAFPID-764796", "CSAFPID-764857", "CSAFPID-342808", "CSAFPID-220456", "CSAFPID-93308", "CSAFPID-93306", "CSAFPID-220368", "CSAFPID-220449", "CSAFPID-220455", "CSAFPID-180191", "CSAFPID-180189", "CSAFPID-220369", "CSAFPID-220448", "CSAFPID-764923", "CSAFPID-764924", "CSAFPID-764925", "CSAFPID-764926", "CSAFPID-764262", "CSAFPID-816824", "CSAFPID-764263", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-180204", "CSAFPID-180213", "CSAFPID-180207", "CSAFPID-180208", "CSAFPID-93312", "CSAFPID-93311", "CSAFPID-765261", "CSAFPID-765262", "CSAFPID-93648", "CSAFPID-765263", "CSAFPID-93647", "CSAFPID-220378", "CSAFPID-220377", "CSAFPID-220607", "CSAFPID-220372", "CSAFPID-567702", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-765266", "CSAFPID-400307", "CSAFPID-8848", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-219770", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-219771", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-220374", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912589", "CSAFPID-400311", "CSAFPID-912590", "CSAFPID-400309", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-816829" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-611391", "CSAFPID-611392", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-764273", "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-1751202", "CSAFPID-1751086" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-611391", "CSAFPID-611392", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-764273", "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-1751202", "CSAFPID-1751086" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-1751202", "CSAFPID-1751206", "CSAFPID-1751086", "CSAFPID-1751207", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-1751202", "CSAFPID-1751206", "CSAFPID-1751086", "CSAFPID-1751207", "CSAFPID-1503318" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44483", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" } ], "product_status": { "known_affected": [ "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44483", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44483.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926" ] } ], "title": "CVE-2023-44483" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "other", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" } ], "product_status": { "known_affected": [ "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-220374", "CSAFPID-344845", "CSAFPID-344846", "CSAFPID-764259", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-765266", "CSAFPID-816824", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-816832", "CSAFPID-816833", "CSAFPID-816834", "CSAFPID-816835", "CSAFPID-816836", "CSAFPID-816837", "CSAFPID-816838", "CSAFPID-816839", "CSAFPID-816840", "CSAFPID-816841", "CSAFPID-816842", "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51074", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-1751213", "CSAFPID-220375", "CSAFPID-1751214", "CSAFPID-1751074" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-400309", "CSAFPID-400311", "CSAFPID-765264", "CSAFPID-765265", "CSAFPID-912062", "CSAFPID-912063", "CSAFPID-912064", "CSAFPID-912092", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912589", "CSAFPID-912590", "CSAFPID-912591", "CSAFPID-912592", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-1751213", "CSAFPID-220375", "CSAFPID-1751214", "CSAFPID-1751074" ] } ], "title": "CVE-2023-51074" }, { "cve": "CVE-2023-52070", "product_status": { "known_affected": [ "CSAFPID-1751215" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52070.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751215" ] } ], "title": "CVE-2023-52070" }, { "cve": "CVE-2024-28219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-1503631", "CSAFPID-1673499" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503631", "CSAFPID-1673499" ] } ], "title": "CVE-2024-28219" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-1673499", "CSAFPID-1751206", "CSAFPID-1751207" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318", "CSAFPID-1503637", "CSAFPID-1503638", "CSAFPID-764926", "CSAFPID-1673499", "CSAFPID-1751206", "CSAFPID-1751207" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1751202", "CSAFPID-1751086", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751202", "CSAFPID-1751086", "CSAFPID-1503318" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "other", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" } ], "product_status": { "known_affected": [ "CSAFPID-1673499", "CSAFPID-1503631" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673499", "CSAFPID-1503631" ] } ], "title": "CVE-2024-35195" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1751072", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-189067", "CSAFPID-1751083", "CSAFPID-1751086", "CSAFPID-1503631", "CSAFPID-220375" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751072", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-189067", "CSAFPID-1751083", "CSAFPID-1751086", "CSAFPID-1503631", "CSAFPID-220375" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-220375", "CSAFPID-1751083", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-1503631", "CSAFPID-189067", "CSAFPID-1751086", "CSAFPID-1751072" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38820", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220375", "CSAFPID-1751083", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-1503631", "CSAFPID-189067", "CSAFPID-1751086", "CSAFPID-1751072" ] } ], "title": "CVE-2024-38820" }, { "cve": "CVE-2024-38827", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1503631" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38827", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503631" ] } ], "title": "CVE-2024-38827" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-220375", "CSAFPID-1751083", "CSAFPID-189067", "CSAFPID-1503318", "CSAFPID-1751202", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-1751213", "CSAFPID-1751214", "CSAFPID-219774", "CSAFPID-1751086", "CSAFPID-1751072" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220375", "CSAFPID-1751083", "CSAFPID-189067", "CSAFPID-1503318", "CSAFPID-1751202", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-1751213", "CSAFPID-1751214", "CSAFPID-219774", "CSAFPID-1751086", "CSAFPID-1751072" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-220375", "CSAFPID-1751083", "CSAFPID-189067", "CSAFPID-1503318", "CSAFPID-1751202", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-1751213", "CSAFPID-1751214", "CSAFPID-219774", "CSAFPID-1751086", "CSAFPID-1751072" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220375", "CSAFPID-1751083", "CSAFPID-189067", "CSAFPID-1503318", "CSAFPID-1751202", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-1751078", "CSAFPID-1751213", "CSAFPID-1751214", "CSAFPID-219774", "CSAFPID-1751086", "CSAFPID-1751072" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-189067", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-220375" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-189067", "CSAFPID-1503630", "CSAFPID-1751074", "CSAFPID-220375" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-220375", "CSAFPID-1503630", "CSAFPID-189067", "CSAFPID-1751074" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220375", "CSAFPID-1503630", "CSAFPID-189067", "CSAFPID-1751074" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-220375", "CSAFPID-1503630", "CSAFPID-189067", "CSAFPID-1751074" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220375", "CSAFPID-1503630", "CSAFPID-189067", "CSAFPID-1751074" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2025-21550", "product_status": { "known_affected": [ "CSAFPID-189067", "CSAFPID-1503630", "CSAFPID-1751074" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21550", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21550.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-189067", "CSAFPID-1503630", "CSAFPID-1751074" ] } ], "title": "CVE-2025-21550" } ] }
fkie_cve-2022-34169
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/07/19/5 | Mailing List, Third Party Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/07/19/6 | Mailing List, Third Party Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/07/20/2 | Mailing List, Third Party Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/07/20/3 | Mailing List, Patch, Third Party Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/10/18/2 | Mailing List, Patch, Third Party Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/11/04/8 | Mailing List, Third Party Advisory | |
security@apache.org | http://www.openwall.com/lists/oss-security/2022/11/07/2 | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw | Issue Tracking, Mailing List, Vendor Advisory | |
security@apache.org | https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8 | Issue Tracking, Mailing List, Vendor Advisory | |
security@apache.org | https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html | Mailing List, Third Party Advisory | |
security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/ | ||
security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/ | ||
security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/ | ||
security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/ | ||
security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/ | ||
security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/ | ||
security@apache.org | https://security.gentoo.org/glsa/202401-25 | ||
security@apache.org | https://security.netapp.com/advisory/ntap-20220729-0009/ | Third Party Advisory | |
security@apache.org | https://security.netapp.com/advisory/ntap-20240621-0006/ | ||
security@apache.org | https://www.debian.org/security/2022/dsa-5188 | Third Party Advisory | |
security@apache.org | https://www.debian.org/security/2022/dsa-5192 | Third Party Advisory | |
security@apache.org | https://www.debian.org/security/2022/dsa-5256 | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/07/19/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/07/19/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/07/20/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/07/20/3 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/10/18/2 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/04/8 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/07/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8 | Issue Tracking, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202401-25 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220729-0009/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240621-0006/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5188 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5192 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5256 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
apache | xalan-java | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
oracle | graalvm | 20.3.6 | |
oracle | graalvm | 21.3.2 | |
oracle | graalvm | 22.1.0 | |
oracle | jdk | 1.7.0 | |
oracle | jdk | 1.8.0 | |
oracle | jdk | 11.0.15.1 | |
oracle | jdk | 17.0.3.1 | |
oracle | jdk | 18.0.1.1 | |
oracle | jre | 1.7.0 | |
oracle | jre | 1.8.0 | |
oracle | jre | 11.0.15.1 | |
oracle | jre | 17.0.3.1 | |
oracle | jre | 18.0.1.1 | |
oracle | openjdk | * | |
oracle | openjdk | * | |
oracle | openjdk | * | |
oracle | openjdk | * | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 18 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
netapp | 7-mode_transition_tool | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | cloud_insights_acquisition_unit | - | |
netapp | cloud_secure_agent | - | |
netapp | hci_management_node | - | |
netapp | oncommand_insight | - | |
netapp | solidfire | - | |
netapp | hci_compute_node | - | |
azul | zulu | 6.47 | |
azul | zulu | 7.54 | |
azul | zulu | 8.62 | |
azul | zulu | 11.56 | |
azul | zulu | 13.48 | |
azul | zulu | 15.40 | |
azul | zulu | 17.34 | |
azul | zulu | 18.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*", "matchCriteriaId": "E406791B-F9FD-4E3F-831C-296D8F8FF9BE", "versionEndIncluding": "2.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7D961E24-EA18-4217-B5F5-F847726D84E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "601D92C4-F71F-47E2-9041-5C286D2137F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B18FE85D-C53D-44E9-8992-715820D1264B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*", "matchCriteriaId": "6E3C0BA3-FCD3-4CB8-B8C7-F931090A7DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*", "matchCriteriaId": "EB2A5440-7FA7-4A86-AA19-E2ABBD809B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:11.0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C0485FC-E4B2-464E-8228-1387AC5F353B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7AF3539B-0434-4310-AE88-F46864C7C20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:18.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5CC9398-71B6-4480-95ED-EDCE838D157E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update343:*:*:*:*:*:*", "matchCriteriaId": "60614E43-090E-44D7-94AD-FFAE38FF111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update333:*:*:*:*:*:*", "matchCriteriaId": "131E1C9E-721C-4176-B78B-69C01F90A9A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:11.0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD4BFA12-588A-4D8D-B45F-648A55EC674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:18.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EF9CFB1-CEC9-483E-BECF-618190C03944", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD2ADA66-DCD0-4D28-80B2-77A0265CE7B9", "versionEndIncluding": "11.0.15", "versionStartIncluding": "11", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA6BC07-2BDA-4913-AF2B-FD2146B0E539", "versionEndIncluding": "13.0.11", "versionStartIncluding": "13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A2E366B-549D-48C5-B3FB-AD0E8C75AE08", "versionEndIncluding": "15.0.7", "versionStartIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "15FD6A0B-BB1A-4875-926C-AB1B6EC1A053", "versionEndIncluding": "17.0.3", "versionStartIncluding": "17", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", "matchCriteriaId": "E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", "matchCriteriaId": "02011EDC-20A7-4A16-A592-7C76E0037997", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", "matchCriteriaId": "AC6D4652-1226-4C60-BEDF-01EBF8AC0849", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", "matchCriteriaId": "3C1F9ED7-7D93-41F4-9130-15BA734420AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", "matchCriteriaId": "1CF9CDF1-95D3-4125-A73F-396D2280FC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", "matchCriteriaId": "A13266DC-F8D9-4F30-987F-65BBEAF8D3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", "matchCriteriaId": "C28388AB-CFC9-4749-A90F-383F5B905EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", "matchCriteriaId": "DA1B00F9-A81C-48B7-8DAA-F394DDF323F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", "matchCriteriaId": "CA7AD457-6CE6-4925-8D94-A907B40233D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", "matchCriteriaId": "A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", "matchCriteriaId": "5480E5AD-DB46-474A-9B57-84ED088A75FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", "matchCriteriaId": "881A4AE9-6012-4E91-98BE-0A352CC20703", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", "matchCriteriaId": "7E1E1079-57D9-473B-A017-964F4745F329", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", "matchCriteriaId": "B8D6446E-2915-4F12-87BE-E7420BC2626E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", "matchCriteriaId": "564EDCE3-16E6-401D-8A43-032D1F8875E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", "matchCriteriaId": "08278802-D31B-488A-BA6A-EBC816DF883A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", "matchCriteriaId": "72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", "matchCriteriaId": "7BBB0969-565E-43E2-B067-A10AAA5F1958", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", "matchCriteriaId": "D78BE95D-6270-469A-8035-FCDDB398F952", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", "matchCriteriaId": "88C24F40-3150-4584-93D9-8307DE04EEE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", "matchCriteriaId": "E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", "matchCriteriaId": "19626B36-62FC-4497-A2E1-7D6CD9839B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", "matchCriteriaId": "5713AEBD-35F6-44E8-A0CC-A42830D7AE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", "matchCriteriaId": "8BE0C04B-440E-4B35-ACC8-6264514F764C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", "matchCriteriaId": "555EC2A6-0475-48ED-AE0C-B306714A9333", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", "matchCriteriaId": "EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*", "matchCriteriaId": "02C55E2E-AEDE-455C-B128-168C918B5D97", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*", "matchCriteriaId": "81831D37-6597-441B-87DE-38F7191BEA42", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*", "matchCriteriaId": "EEA1594D-0AB5-436D-9E60-C26EE2175753", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*", "matchCriteriaId": "B868FA41-C71B-491C-880B-484740B30C72", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", "matchCriteriaId": "C242D3BE-9114-4A9E-BB78-45754C7CC450", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*", "matchCriteriaId": "95954182-9541-4181-9647-B17FA5A79F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*", "matchCriteriaId": "9F6F0137-F91F-4028-BED2-C29640D52C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*", "matchCriteriaId": "EAFB6B15-4AE6-47FC-8847-9DFADB7AE253", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", "matchCriteriaId": "D61068FE-18EE-4ADB-BC69-A3ECE8724575", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", "matchCriteriaId": "EFB59E80-4EC4-4399-BF40-6733E4E475A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", "matchCriteriaId": "84E31265-22E1-4E91-BFCB-D2AFF445926A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", "matchCriteriaId": "AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", "matchCriteriaId": "50319E52-8739-47C5-B61E-3CA9B6A9A48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", "matchCriteriaId": "7ED515B9-DC74-4DC5-B98A-08D87D85E11E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", "matchCriteriaId": "6D1D4868-1F9F-43F7-968C-6469B67D3F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", "matchCriteriaId": "568F1AC4-B0D7-4438-82E5-0E61500F2240", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", "matchCriteriaId": "F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", "matchCriteriaId": "14E9133E-9FF3-40DB-9A11-7469EF5FD265", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", "matchCriteriaId": "94834710-3FA9-49D9-8600-B514CBCA4270", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", "matchCriteriaId": "4228D9E1-7D82-4B49-9669-9CDAD7187432", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", "matchCriteriaId": "F6231F48-2936-4F7D-96D5-4BA11F78EBE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", "matchCriteriaId": "D96D5061-4A81-497E-9AD6-A8381B3B454C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", "matchCriteriaId": "5345C21E-A01B-43B9-9A20-F2783D921C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", "matchCriteriaId": "B219F360-83BD-4111-AB59-C9D4F55AF4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", "matchCriteriaId": "D25377EA-8E8F-4C76-8EA9-3BBDFB352815", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", "matchCriteriaId": "59FEFE05-269A-4EAF-A80F-E4C2107B1197", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", "matchCriteriaId": "E7E2AA7C-F602-4DB7-9EC1-0708C46C253C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", "matchCriteriaId": "FB70E154-A304-429E-80F5-8D87B00E32D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "matchCriteriaId": "70892D06-6E75-4425-BBF0-4B684EC62A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", "matchCriteriaId": "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", "matchCriteriaId": "7417B2BB-9AC2-4AF4-A828-C89A0735AD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", "matchCriteriaId": "6A0A57B5-6F88-4288-9CDE-F6613FE068D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", "matchCriteriaId": "67ED8559-C348-4932-B7CE-CB96976A30EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", "matchCriteriaId": "40AC3D91-263F-4345-9FAA-0E573EA64590", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", "matchCriteriaId": "DD92AFA9-81F8-48D4-B79A-E7F066F69A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", "matchCriteriaId": "2C4B2F24-A730-4818-90C8-A2D90C081F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", "matchCriteriaId": "464087F2-C285-4574-957E-CE0663F07DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", "matchCriteriaId": "3E9BB880-A4F6-4887-8BB9-47AA298753D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "matchCriteriaId": "18DCFF53-B298-4534-AB5C-8A5EF59C616F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "matchCriteriaId": "083419F8-FDDF-4E36-88F8-857DB317C1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "matchCriteriaId": "D7A74F65-57E8-4C9A-BA96-5EF401504F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "matchCriteriaId": "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "matchCriteriaId": "07812576-3C35-404C-A7D7-9BE9E3D76E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "matchCriteriaId": "00C52B1C-5447-4282-9667-9EBE0720B423", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "matchCriteriaId": "92BB9EB0-0C12-4E77-89EE-FB77097841B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "matchCriteriaId": "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "matchCriteriaId": "ABC0E7BB-F8B7-4369-9910-71240E4073A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "matchCriteriaId": "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "matchCriteriaId": "0AE30779-48FB-451E-8CE1-F469F93B8772", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "matchCriteriaId": "60590FDE-7156-4314-A012-AA38BD2ADDC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "matchCriteriaId": "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "matchCriteriaId": "F24F6122-2256-41B6-9033-794C6424ED99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "matchCriteriaId": "0EAFA79E-8C7A-48CF-8868-11378FE4B26F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "matchCriteriaId": "D1D6F19F-59B5-4BB6-AD35-013384025970", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "matchCriteriaId": "E7BA97BC-3ADA-465A-835B-6C3C5F416B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "matchCriteriaId": "B71F77A4-B7EB-47A1-AAFD-431A7D040B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "matchCriteriaId": "91D6BEA9-5943-44A4-946D-CEAA9BA99376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "matchCriteriaId": "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "matchCriteriaId": "2CB74086-14B8-4237-8357-E0C6B5BB8313", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "matchCriteriaId": "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "matchCriteriaId": "00C2B9C9-1177-4DA6-96CE-55F37F383F99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", "matchCriteriaId": "435CF189-0BD8-40DF-A0DC-99862CDEAF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "matchCriteriaId": "12A3F367-33AD-47C3-BFDC-871A17E72C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", "matchCriteriaId": "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "matchCriteriaId": "78261932-7373-4F16-91E0-1A72ADBEBC3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", "matchCriteriaId": "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "matchCriteriaId": "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", "matchCriteriaId": "F5A40B8A-D428-4008-9F21-AF21394C51D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", "matchCriteriaId": "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", "matchCriteriaId": "3B504718-5DCE-43B4-B19A-C6B6E7444BD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", "matchCriteriaId": "3102AA10-99A8-49A9-867E-7EEC56865680", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", "matchCriteriaId": "5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*", "matchCriteriaId": "15BA8A26-2CDA-442B-A549-6BE92DCCD205", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*", "matchCriteriaId": "56F2883B-6A1B-4081-8877-07AF3A73F6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*", "matchCriteriaId": "98C0742E-ACDD-4DB4-8A4C-B96702C8976C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", "matchCriteriaId": "F8483034-DD5A-445D-892F-CDE90A7D58EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*", "matchCriteriaId": "1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*", "matchCriteriaId": "DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*", "matchCriteriaId": "A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", "matchCriteriaId": "8279718F-878F-4868-8859-1728D13CD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", "matchCriteriaId": "2C024E1A-FD2C-42E8-B227-C2AFD3040436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", "matchCriteriaId": "4F24389D-DDD0-4204-AA24-31C920A4F47E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", "matchCriteriaId": "966979BE-1F21-4729-B6B8-610F74648344", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", "matchCriteriaId": "F8534265-33BF-460D-BF74-5F55FDE50F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", "matchCriteriaId": "F77AFC25-1466-4E56-9D5F-6988F3288E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", "matchCriteriaId": "A650BEB8-E56F-4E42-9361-8D2DB083F0F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", "matchCriteriaId": "799FFECD-E80A-44B3-953D-CDB5E195F3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", "matchCriteriaId": "A7047507-7CAF-4A14-AA9A-5CEF806EDE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", "matchCriteriaId": "CFC7B179-95D3-4F94-84F6-73F1034A1AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", "matchCriteriaId": "9FB28526-9385-44CA-AF08-1899E6C3AE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", "matchCriteriaId": "E26B69E4-0B43-415F-A82B-52FDCB262B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", "matchCriteriaId": "27BC4150-70EC-462B-8FC5-20B3442CBB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", "matchCriteriaId": "02646989-ECD9-40AE-A83E-EFF4080C69B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:18:*:*:*:*:*:*:*", "matchCriteriaId": "56CBFC1F-C120-44F2-877A-C1C880AA89C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF6650C-558D-45C8-AE7D-136EE70CB6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*", "matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*", "matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*", "matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*", "matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*", "matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." }, { "lang": "es", "value": "La biblioteca Apache Xalan Java XSLT es vulnerable a un problema de truncamiento de enteros cuando procesa hojas de estilo XSLT maliciosas. Esto puede usarse para corromper los archivos de clase Java generados por el compilador interno XSLTC y ejecutar c\u00f3digo de bytes Java arbitrario. El proyecto Apache Xalan Java est\u00e1 inactivo y en proceso de ser retirado. No son esperadas futuras versiones de Apache Xalan Java que abordan este problema. Nota: Los tiempos de ejecuci\u00f3n de Java (como OpenJDK) incluyen copias reempaquetadas de Xalan." } ], "id": "CVE-2022-34169", "lastModified": "2024-11-21T07:08:59.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-19T18:15:11.740", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "source": "security@apache.org", "url": "https://security.gentoo.org/glsa/202401-25" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202401-25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-681" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-9339-86wc-4qgf
Vulnerability from github
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "xalan:xalan" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.7.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-34169" ], "database_specific": { "cwe_ids": [ "CWE-681" ], "github_reviewed": true, "github_reviewed_at": "2022-07-21T22:28:36Z", "nvd_published_at": "2022-07-19T18:15:00Z", "severity": "HIGH" }, "details": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.\n\nA fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.", "id": "GHSA-9339-86wc-4qgf", "modified": "2024-06-24T21:23:11Z", "published": "2022-07-20T00:00:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "type": "WEB", "url": "https://xalan.apache.org" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5256" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5192" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5188" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220729-0009" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-25" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471" }, { "type": "WEB", "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "type": "WEB", "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81" }, { "type": "PACKAGE", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.